Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

DTLS fatal alert : illegal parameter

220 views
Skip to first unread message

Alexander Abagian

unread,
Aug 31, 2016, 2:58:44 PM8/31/16
to mozilla-...@lists.mozilla.org
Hi all,

In random cases, when Firefox webrtc client connects to the media server, I'm getting a DTLS handshake for the video channel (only) fails with DTLS v1.2 alert "illegal parameter". What is strange, that this alert is the first DTLS message in the whole DTLS handshake session; and never appears in audio channel (we use separate audio and video connections).

RFC tells :

illegal_parameter
A field in the handshake was out of range or inconsistent with
other fields. This message is always fatal.

But the alert message is the first one ! Could it be a reaction not to a incoming DTLS, but to a wrong DTLS-related configurations in Firefox SDP ?

The server uses DTLS v1.0.

Wireshark log:
filter: ip.addr == 192.168.125.138 && dtls

5202 16:10:02.859969 192.168.125.39 50423 192.168.125.138 57 DTLSv1.2 Alert (Level: Fatal, Description: Illegal Parameter) 9001
5223 16:10:03.060687 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
5255 16:10:03.353462 192.168.125.138 8001 192.168.125.39 263 DTLSv1.0 Client Hello 52713
5259 16:10:03.357654 192.168.125.39 52713 192.168.125.138 681 DTLSv1.0 Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done 8001
5262 16:10:03.383612 192.168.125.138 8001 192.168.125.39 298 DTLSv1.0 Certificate (Fragment) 52713
5263 16:10:03.391366 192.168.125.138 8001 192.168.125.39 298 DTLSv1.0 Certificate (Reassembled), Client Key Exchange (Fragment) 52713
5265 16:10:03.497471 192.168.125.138 8001 192.168.125.39 278 DTLSv1.0 Client Key Exchange (Reassembled), Certificate Verify 52713
5266 16:10:03.497691 192.168.125.138 8001 192.168.125.39 133 DTLSv1.0 Change Cipher Spec, Encrypted Handshake Message 52713
5273 16:10:03.502496 192.168.125.39 52713 192.168.125.138 133 DTLSv1.0 Change Cipher Spec, Encrypted Handshake Message 8001
5485 16:10:05.002177 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
6012 16:10:09.001930 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
6928 16:10:16.992382 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
8791 16:10:32.971012 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423

Nils Ohlmeier

unread,
Aug 31, 2016, 4:44:43 PM8/31/16
to Alexander Abagian, mozilla-...@lists.mozilla.org
Hi Alexander,

I think we would need to see the SDP for the matching call. The SDP should tell you which side of the call got negotiated as the DTLS server and client.
Which version of Firefox do you see this problem with?

Looking at our code briefly it potentially could be that Firefox does send such an Alert in case it is the DTLS server and never receives a Client Hello.

Best regards
Nils Ohlmeier
> _______________________________________________
> dev-media mailing list
> dev-...@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-media

signature.asc

Alexander Abagian

unread,
Sep 1, 2016, 7:51:26 AM9/1/16
to mozilla-...@lists.mozilla.org
Here's webrtc-internals. The pcap is almost the same, the only difference is some 5-digit ports. Firefox ip is 192.168.125.39. Media server (192.168.125.138) is offerer, and acts as a DTLS client.



Session Statistics

[ 27 ] https://deb7-abagyan.mambet.com/service/wconference 14:25:31 GMT+0300 (Russia TZ 2 Standard Time)



▲ hide details

PeerConnection ID: 1472729089230000 (id=27 url=https://deb7-abagyan.mambet.com/service/wconference)

ICE Stats

Local Candidate Remote Candidate ICE State Priority Nominated Selected

192.168.125.39:55869/udp(host) 192.168.125.138:8000/udp(host) succeeded 288226016709444100

192.168.125.39:55869/udp(host) 192.168.125.138:8001/udp(peerreflexive) succeeded 288226016709444100 true true

192.168.125.39:55870/udp(host) 192.168.125.138:9000/udp(host) succeeded 288226016709444100

192.168.125.39:55870/udp(host) 192.168.125.138:9001/udp(peerreflexive) succeeded 288226016709444100 true true

192.168.125.39:55869/udp(host) 91.224.14.66:8001/udp(serverreflexive) failed 216169513593209340

192.168.125.39:55870/udp(host) 91.224.14.66:9001/udp(serverreflexive) failed 216169513593209340

91.224.14.66:55869/udp(serverreflexive)

91.224.14.66:55870/udp(serverreflexive)



SDP



Local SDP



v=0

o=mozilla...THIS_IS_SDPARTA-48.0.2 5443600466726378599 0 IN IP4 0.0.0.0

s=-

t=0 0

a=sendrecv

a=fingerprint:sha-256 30:00:90:1C:9D:73:BB:4E:DC:94:F7:96:79:3F:F1:DB:F3:4C:F5:04:0E:FC:00:FE:9E:66:86:F0:6F:AF:96:E9

a=group:BUNDLE audio-0 audio-1737001014 audio-1911239378

a=group:BUNDLE video-0 video-3547423715 video-4051102265

a=ice-options:trickle

a=msid-semantic:WMS *



m=audio 55869 RTP/SAVPF 9

c=IN IP4 91.224.14.66

a=candidate:0 1 UDP 2122252543 192.168.125.39 55869 typ host

a=candidate:4 1 UDP 1686052095 91.224.14.66 55869 typ srflx raddr 192.168.125.39 rport 55869

a=sendrecv

a=end-of-candidates

a=ice-pwd:2b70b1841d0b667b13c91508008520b8

a=ice-ufrag:51dfd28f

a=mid:audio-0

a=msid:{be97623d-88b7-481b-884c-4d85577b6c72} {11e037cf-6786-4a1d-a960-22fdb4dc6da3}

a=rtcp-mux

a=rtpmap:9 G722/8000/1

a=setup:passive

a=ssrc:70122188 cname:{fd9db606-3ed8-4e43-85b0-dcdcd8ec4934}



m=video 55870 RTP/SAVPF 100

c=IN IP4 91.224.14.66

a=candidate:0 1 UDP 2122252543 192.168.125.39 55870 typ host

a=candidate:4 1 UDP 1686052095 91.224.14.66 55870 typ srflx raddr 192.168.125.39 rport 55870

a=sendrecv

a=end-of-candidates

a=fmtp:100 max-fs=12288;max-fr=60

a=ice-pwd:2b70b1841d0b667b13c91508008520b8

a=ice-ufrag:51dfd28f

a=mid:video-0

a=msid:{6ed6c966-0e81-4a08-a5e8-a8fa1440936e} {3979ee12-9e07-45a5-8285-0819b99d6fa7}

a=rtcp-fb:100 nack

a=rtcp-fb:100 nack pli

a=rtcp-fb:100 ccm fir

a=rtcp-mux

a=rtpmap:100 VP8/90000

a=setup:passive

a=ssrc:2444047482 cname:{fd9db606-3ed8-4e43-85b0-dcdcd8ec4934}



m=audio 55869 RTP/SAVPF 9

c=IN IP4 91.224.14.66

a=recvonly

a=ice-pwd:2b70b1841d0b667b13c91508008520b8

a=ice-ufrag:51dfd28f

a=mid:audio-1737001014

a=rtcp-mux

a=rtpmap:9 G722/8000/1

a=setup:passive

a=ssrc:3213665801 cname:{fd9db606-3ed8-4e43-85b0-dcdcd8ec4934}



m=audio 55869 RTP/SAVPF 9

c=IN IP4 91.224.14.66

a=recvonly

a=ice-pwd:2b70b1841d0b667b13c91508008520b8

a=ice-ufrag:51dfd28f

a=mid:audio-1911239378

a=rtcp-mux

a=rtpmap:9 G722/8000/1

a=setup:passive

a=ssrc:3498610632 cname:{fd9db606-3ed8-4e43-85b0-dcdcd8ec4934}



m=video 55870 RTP/SAVPF 100

c=IN IP4 91.224.14.66

a=recvonly

a=fmtp:100 max-fs=12288;max-fr=60

a=ice-pwd:2b70b1841d0b667b13c91508008520b8

a=ice-ufrag:51dfd28f

a=mid:video-3547423715

a=rtcp-fb:100 nack

a=rtcp-fb:100 nack pli

a=rtcp-fb:100 ccm fir

a=rtcp-mux

a=rtpmap:100 VP8/90000

a=setup:passive

a=ssrc:1323419188 cname:{fd9db606-3ed8-4e43-85b0-dcdcd8ec4934}



m=video 55870 RTP/SAVPF 100

c=IN IP4 91.224.14.66

a=recvonly

a=fmtp:100 max-fs=12288;max-fr=60

a=ice-pwd:2b70b1841d0b667b13c91508008520b8

a=ice-ufrag:51dfd28f

a=mid:video-4051102265

a=rtcp-fb:100 nack

a=rtcp-fb:100 nack pli

a=rtcp-fb:100 ccm fir

a=rtcp-mux

a=rtpmap:100 VP8/90000

a=setup:passive

a=ssrc:2495413094 cname:{fd9db606-3ed8-4e43-85b0-dcdcd8ec4934}







Remote SDP

v=0

o=- 785148216 2 IN IP4 127.0.0.1

s=-

t=0 0

a=sendrecv

a=group:BUNDLE audio-0 audio-1737001014 audio-1911239378

a=group:BUNDLE video-0 video-3547423715 video-4051102265

a=ice-options:trickle

a=msid-semantic:WMS *



m=audio 1 RTP/SAVPF 102 18 9 117 116 118 115 114 99 96 113 112 8 0 124 125

c=IN IP4 192.168.125.117

b=AS:50

a=candidate:4290762872 1 UDP 67107848 192.168.125.138 8000 typ host generation 0

a=candidate:4290762872 2 UDP 67107848 192.168.125.138 8000 typ host generation 0

a=candidate:1316968211 1 UDP 50330886 91.224.14.66 8001 typ srflx raddr 192.168.125.138 rport 8001 generation 0

a=candidate:1316968211 2 UDP 50330886 91.224.14.66 8001 typ srflx raddr 192.168.125.138 rport 8001 generation 0

a=sendrecv

a=end-of-candidates

a=fingerprint:sha-256 15:E9:90:B9:A9:2A:38:33:AA:6A:61:D5:30:F3:23:9B:88:F8:A1:C9:FE:20:1A:7D:4E:3D:39:D0:06:FE:6E:F2

a=ice-pwd:0002CALLIDABCDEFGHIJKLMNPASSWORD

a=ice-ufrag:0002USER

a=mid:audio-0

a=rtcp:1 IN IP4 0.0.0.0

a=rtcp-mux

a=rtpmap:102 ip-mr_v2.5/16000/1

a=rtpmap:18 G729/8000/1

a=rtpmap:9 G722/8000/1

a=rtpmap:117 G722/16000/1

a=rtpmap:116 G722/16000/1

a=rtpmap:118 G722/8000/1

a=rtpmap:115 G7221/16000/1

a=rtpmap:114 G7221/16000/1

a=rtpmap:99 speex/16000/1

a=rtpmap:96 speex/8000/1

a=rtpmap:113 SILK/16000/1

a=rtpmap:112 SILK/8000/1

a=rtpmap:8 PCMA/8000

a=rtpmap:0 PCMU/8000

a=rtpmap:124 mamb-ars/1000/1

a=rtpmap:125 mamb-fec/90000/1

a=setup:active



m=video 1 RTP/SAVPF 109 100 46 40 124 125

c=IN IP4 192.168.125.117

b=AS:500

a=candidate:4290762872 1 UDP 67107848 192.168.125.138 9000 typ host generation 0

a=candidate:4290762872 2 UDP 67107848 192.168.125.138 9000 typ host generation 0

a=candidate:1316968211 1 UDP 50330886 91.224.14.66 9001 typ srflx raddr 192.168.125.138 rport 9001 generation 0

a=candidate:1316968211 2 UDP 50330886 91.224.14.66 9001 typ srflx raddr 192.168.125.138 rport 9001 generation 0

a=sendrecv

a=end-of-candidates

a=fingerprint:sha-256 15:E9:90:B9:A9:2A:38:33:AA:6A:61:D5:30:F3:23:9B:88:F8:A1:C9:FE:20:1A:7D:4E:3D:39:D0:06:FE:6E:F2

a=ice-pwd:0002CALLIDABCDEFGHIJKLMNPASSWORD

a=ice-ufrag:0002USER

a=mid:video-0

a=rtcp:1 IN IP4 0.0.0.0

a=rtcp-fb:100 ccm fir

a=rtcp-fb:100 nack

a=rtcp-fb:100 nack pli

a=rtcp-mux

a=rtpmap:109 H264-SVC/90000

a=rtpmap:100 VP8/90000

a=rtpmap:46 VP8-SVC/90000

a=rtpmap:40 H263-1998/90000

a=rtpmap:124 mamb-ars/1000

a=rtpmap:125 mamb-fec/90000

a=setup:active



m=audio 1 RTP/SAVPF 102 18 9 117 116 118 115 114 99 96 113 112 8 0 124 125

c=IN IP4 192.168.125.117

b=AS:50

a=sendrecv

a=end-of-candidates

a=fingerprint:sha-256 15:E9:90:B9:A9:2A:38:33:AA:6A:61:D5:30:F3:23:9B:88:F8:A1:C9:FE:20:1A:7D:4E:3D:39:D0:06:FE:6E:F2

a=ice-pwd:0002CALLIDABCDEFGHIJKLMNPASSWORD

a=ice-ufrag:0002USER

a=mid:audio-1737001014

a=msid:MSID-1-9687(u.vm)@deb7-abagyan.mambet.com-1737001014 MSTIDAUDIO-1-9687(u.vm)@deb7-abagyan.mambet.com-1737001014

a=rtcp:1 IN IP4 0.0.0.0

a=rtcp-mux

a=rtpmap:102 ip-mr_v2.5/16000/1

a=rtpmap:18 G729/8000/1

a=rtpmap:9 G722/8000/1

a=rtpmap:117 G722/16000/1

a=rtpmap:116 G722/16000/1

a=rtpmap:118 G722/8000/1

a=rtpmap:115 G7221/16000/1

a=rtpmap:114 G7221/16000/1

a=rtpmap:99 speex/16000/1

a=rtpmap:96 speex/8000/1

a=rtpmap:113 SILK/16000/1

a=rtpmap:112 SILK/8000/1

a=rtpmap:8 PCMA/8000

a=rtpmap:0 PCMU/8000

a=rtpmap:124 mamb-ars/1000/1

a=rtpmap:125 mamb-fec/90000/1

a=setup:active

a=ssrc:1737001014 cname:RI5jbIs9lnYmG7hd



m=audio 1 RTP/SAVPF 102 18 9 117 116 118 115 114 99 96 113 112 8 0 124 125

c=IN IP4 192.168.125.117

b=AS:50

a=sendrecv

a=end-of-candidates

a=fingerprint:sha-256 15:E9:90:B9:A9:2A:38:33:AA:6A:61:D5:30:F3:23:9B:88:F8:A1:C9:FE:20:1A:7D:4E:3D:39:D0:06:FE:6E:F2

a=ice-pwd:0002CALLIDABCDEFGHIJKLMNPASSWORD

a=ice-ufrag:0002USER

a=mid:audio-1911239378

a=msid:MSID-1-8325(u.vm)@deb7-abagyan.mambet.com-1911239378 MSTIDAUDIO-1-8325(u.vm)@deb7-abagyan.mambet.com-1911239378

a=rtcp:1 IN IP4 0.0.0.0

a=rtcp-mux

a=rtpmap:102 ip-mr_v2.5/16000/1

a=rtpmap:18 G729/8000/1

a=rtpmap:9 G722/8000/1

a=rtpmap:117 G722/16000/1

a=rtpmap:116 G722/16000/1

a=rtpmap:118 G722/8000/1

a=rtpmap:115 G7221/16000/1

a=rtpmap:114 G7221/16000/1

a=rtpmap:99 speex/16000/1

a=rtpmap:96 speex/8000/1

a=rtpmap:113 SILK/16000/1

a=rtpmap:112 SILK/8000/1

a=rtpmap:8 PCMA/8000

a=rtpmap:0 PCMU/8000

a=rtpmap:124 mamb-ars/1000/1

a=rtpmap:125 mamb-fec/90000/1

a=setup:active

a=ssrc:1911239378 cname:tlm/ljFmWThym/vP



m=video 1 RTP/SAVPF 109 100 46 40 124 125

c=IN IP4 192.168.125.117

b=AS:500

a=sendrecv

a=end-of-candidates

a=fingerprint:sha-256 15:E9:90:B9:A9:2A:38:33:AA:6A:61:D5:30:F3:23:9B:88:F8:A1:C9:FE:20:1A:7D:4E:3D:39:D0:06:FE:6E:F2

a=ice-pwd:0002CALLIDABCDEFGHIJKLMNPASSWORD

a=ice-ufrag:0002USER

a=mid:video-3547423715

a=msid:MSID-1-9687(u.vm)@deb7-abagyan.mambet.com-3547423715 MSTIDVIDEO-1-9687(u.vm)@deb7-abagyan.mambet.com-3547423715

a=rtcp:1 IN IP4 0.0.0.0

a=rtcp-fb:100 ccm fir

a=rtcp-fb:100 nack

a=rtcp-fb:100 nack pli

a=rtcp-mux

a=rtpmap:109 H264-SVC/90000

a=rtpmap:100 VP8/90000

a=rtpmap:46 VP8-SVC/90000

a=rtpmap:40 H263-1998/90000

a=rtpmap:124 mamb-ars/1000

a=rtpmap:125 mamb-fec/90000

a=setup:active

a=ssrc:3547423715 cname:RI5jbIs9lnYmG7hd



m=video 1 RTP/SAVPF 109 100 46 40 124 125

c=IN IP4 192.168.125.117

b=AS:500

a=sendrecv

a=end-of-candidates

a=fingerprint:sha-256 15:E9:90:B9:A9:2A:38:33:AA:6A:61:D5:30:F3:23:9B:88:F8:A1:C9:FE:20:1A:7D:4E:3D:39:D0:06:FE:6E:F2

a=ice-pwd:0002CALLIDABCDEFGHIJKLMNPASSWORD

a=ice-ufrag:0002USER

a=mid:video-4051102265

a=msid:MSID-1-8325(u.vm)@deb7-abagyan.mambet.com-4051102265 MSTIDVIDEO-1-8325(u.vm)@deb7-abagyan.mambet.com-4051102265

a=rtcp:1 IN IP4 0.0.0.0

a=rtcp-fb:100 ccm fir

a=rtcp-fb:100 nack

a=rtcp-fb:100 nack pli

a=rtcp-mux

a=rtpmap:109 H264-SVC/90000

a=rtpmap:100 VP8/90000

a=rtpmap:46 VP8-SVC/90000

a=rtpmap:40 H263-1998/90000

a=rtpmap:124 mamb-ars/1000

a=rtpmap:125 mamb-fec/90000

a=setup:active

a=ssrc:4051102265 cname:tlm/ljFmWThym/vP







RTP Stats

outbound_rtcp_audio_0

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) inboundrtp SSRC: 70122188 Received: 1398 packets (218.44 Kb) Lost: 0 Jitter: 0 RTT: 1 ms

inbound_rtp_audio_0

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) inboundrtp SSRC: 0

inbound_rtp_video_1

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) inboundrtp SSRC: 0

inbound_rtp_audio_3

Jitter-buffer delay: 43 ms

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) inboundrtp SSRC: 1911239378 Received: 834 packets (140.09 Kb) Lost: 0 Jitter: 0.027

Remote: 14:25:30 GMT+0300 (Russia TZ 2 Standard Time) outboundrtp SSRC: 1911239378 Sent: 817 packets (137.23 Kb)

inbound_rtp_video_5

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) inboundrtp SSRC: 0

inbound_rtp_audio_2

Jitter-buffer delay: 70 ms

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) inboundrtp SSRC: 1737001014 Received: 822 packets (138.07 Kb) Lost: 0 Jitter: 0.013

Remote: 14:25:30 GMT+0300 (Russia TZ 2 Standard Time) outboundrtp SSRC: 1737001014 Sent: 800 packets (134.38 Kb)

inbound_rtp_video_4

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) inboundrtp SSRC: 0

outbound_rtp_audio_0

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) outboundrtp SSRC: 70122188 Sent: 1576 packets (280.11 Kb)

Remote: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) inboundrtp SSRC: 70122188 Received: 1398 packets (218.44 Kb) Lost: 0 Jitter: 0 RTT: 1 ms

outbound_rtp_video_1

Local: 14:25:31 GMT+0300 (Russia TZ 2 Standard Time) outboundrtp SSRC: 2444047482

inbound_rtcp_audio_3

Local: 14:25:30 GMT+0300 (Russia TZ 2 Standard Time) outboundrtp SSRC: 1911239378 Sent: 817 packets (137.23 Kb)

inbound_rtcp_audio_2

Local: 14:25:30 GMT+0300 (Russia TZ 2 Standard Time) outboundrtp SSRC: 1737001014 Sent: 800 packets (134.38 Kb)

Connection Log

▼ show log









On Wednesday, August 31, 2016 at 11:44:43 PM UTC+3, Nils Ohlmeier wrote:
> Hi Alexander,
>
> I think we would need to see the SDP for the matching call. The SDP should tell you which side of the call got negotiated as the DTLS server and client.
> Which version of Firefox do you see this problem with?
>
> Looking at our code briefly it potentially could be that Firefox does send such an Alert in case it is the DTLS server and never receives a Client Hello.
>
> Best regards
> Nils Ohlmeier
>

Alexander Abagian

unread,
Sep 1, 2016, 7:53:00 AM9/1/16
to mozilla-...@lists.mozilla.org
Firefox version is the latest stable 48.0.2.

Nils Ohlmeier

unread,
Sep 1, 2016, 2:01:11 PM9/1/16
to Alexander Abagian, mozilla-...@lists.mozilla.org

> On Sep 1, 2016, at 04:51, Alexander Abagian <aaba...@gmail.com> wrote:
>
> Here's webrtc-internals. The pcap is almost the same, the only difference is some 5-digit ports. Firefox ip is 192.168.125.39. Media server (192.168.125.138) is offerer, and acts as a DTLS client.

Well in case of your media server being the DTLS client my next question is: can you add the ICE packets for the video port to your Wireshark trace?
And did your media server actually send any DTLS client hello to Firefox?

It is possible that this is some kind of bug in Firefox as we don’t have that many implementations which use on purpose two bundle sets.

Best regards
Nils Ohlmeier
signature.asc

Alexander Abagian

unread,
Sep 1, 2016, 3:29:03 PM9/1/16
to mozilla-...@lists.mozilla.org
Here's it. The line right after Alert is server Client Hello.

9 16:10:02.130349 192.168.125.138 9001 192.168.125.39 154 STUN Binding Request user: 9affe06b0002USER 50423
12 16:10:02.132106 192.168.125.39 50423 192.168.125.138 82 STUN Binding Error Response error-code: 401 (Unauthorized) Unauthorized 9001
16 16:10:02.256364 192.168.125.138 9001 192.168.125.39 158 STUN Binding Request user: 9affe06b:0002USER 50423
22 16:10:02.259959 192.168.125.39 50423 192.168.125.138 142 STUN Binding Request user: 0002USER:9affe06b 9001
23 16:10:02.260247 192.168.125.39 50423 192.168.125.138 106 STUN Binding Success Response XOR-MAPPED-ADDRESS: 192.168.125.138:9001 9001
24 16:10:02.260766 192.168.125.138 9001 192.168.125.39 130 STUN Binding Success Response user: 0002USER:9affe06b XOR-MAPPED-ADDRESS: 192.168.125.39:50423 50423
28 16:10:02.812030 192.168.125.138 9001 192.168.125.39 158 STUN Binding Request user: 9affe06b:0002USER 50423
32 16:10:02.815013 192.168.125.39 50423 192.168.125.138 106 STUN Binding Success Response XOR-MAPPED-ADDRESS: 192.168.125.138:9001 9001
33 16:10:02.859969 192.168.125.39 50423 192.168.125.138 57 DTLSv1.2 Alert (Level: Fatal, Description: Illegal Parameter) 9001
34 16:10:03.060687 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
46 16:10:03.774995 192.168.125.138 9001 192.168.125.39 158 STUN Binding Request user: 9affe06b:0002USER 50423
49 16:10:03.776711 192.168.125.39 50423 192.168.125.138 106 STUN Binding Success Response XOR-MAPPED-ADDRESS: 192.168.125.138:9001 9001
50 16:10:05.002177 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
51 16:10:09.001930 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
52 16:10:16.992382 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
53 16:10:32.971012 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423


On Thursday, September 1, 2016 at 9:01:11 PM UTC+3, Nils Ohlmeier wrote:

Nils Ohlmeier

unread,
Sep 1, 2016, 5:54:02 PM9/1/16
to Alexander Abagian, mozilla-...@lists.mozilla.org
Hi Alexander,

That indeed looks like a bug in Firefox. I’m pretty sure the DTLS server is not suppose to send anything while waiting for the initial Hello. I opened this bug report for your problem https://bugzilla.mozilla.org/show_bug.cgi?id=1299952
I was not able to reproduce the problem by simply letting the client not send the initial Hello. So something must be different in your setup.
If you could get the signaling log file like described here https://wiki.mozilla.org/Media/WebRTC/Logging#Signaling_.28SDP_offer.2Fanswer_handling.29
and attach it to the bug report that would be really helpful.

Thank you
Nils Ohlmeier

> On Sep 1, 2016, at 12:28, Alexander Abagian <aaba...@gmail.com> wrote:
>
> Here's it. The line right after Alert is server Client Hello.
>
> 9 16:10:02.130349 192.168.125.138 9001 192.168.125.39 154 STUN Binding Request user: 9affe06b0002USER 50423
> 12 16:10:02.132106 192.168.125.39 50423 192.168.125.138 82 STUN Binding Error Response error-code: 401 (Unauthorized) Unauthorized 9001
> 16 16:10:02.256364 192.168.125.138 9001 192.168.125.39 158 STUN Binding Request user: 9affe06b:0002USER 50423
> 22 16:10:02.259959 192.168.125.39 50423 192.168.125.138 142 STUN Binding Request user: 0002USER:9affe06b 9001
> 23 16:10:02.260247 192.168.125.39 50423 192.168.125.138 106 STUN Binding Success Response XOR-MAPPED-ADDRESS: 192.168.125.138:9001 9001
> 24 16:10:02.260766 192.168.125.138 9001 192.168.125.39 130 STUN Binding Success Response user: 0002USER:9affe06b XOR-MAPPED-ADDRESS: 192.168.125.39:50423 50423
> 28 16:10:02.812030 192.168.125.138 9001 192.168.125.39 158 STUN Binding Request user: 9affe06b:0002USER 50423
> 32 16:10:02.815013 192.168.125.39 50423 192.168.125.138 106 STUN Binding Success Response XOR-MAPPED-ADDRESS: 192.168.125.138:9001 9001
> 33 16:10:02.859969 192.168.125.39 50423 192.168.125.138 57 DTLSv1.2 Alert (Level: Fatal, Description: Illegal Parameter) 9001
> 34 16:10:03.060687 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
> 46 16:10:03.774995 192.168.125.138 9001 192.168.125.39 158 STUN Binding Request user: 9affe06b:0002USER 50423
> 49 16:10:03.776711 192.168.125.39 50423 192.168.125.138 106 STUN Binding Success Response XOR-MAPPED-ADDRESS: 192.168.125.138:9001 9001
> 50 16:10:05.002177 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
> 51 16:10:09.001930 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
> 52 16:10:16.992382 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
> 53 16:10:32.971012 192.168.125.138 9001 192.168.125.39 263 DTLSv1.0 Client Hello 50423
>
>
> On Thursday, September 1, 2016 at 9:01:11 PM UTC+3, Nils Ohlmeier wrote:
signature.asc
0 new messages