Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Pion.DTLS to 2.2.6 #5

Merged
merged 45 commits into from Mar 8, 2023
Merged

Update Pion.DTLS to 2.2.6 #5

merged 45 commits into from Mar 8, 2023

Conversation

unity-ptrottier
Copy link

@unity-ptrottier unity-ptrottier commented Mar 8, 2023

Fixes a memory leak with deadlines: pion/transport#208

tested with k6 OK.

Last commit reduces the inbound size, which lead to much better tail latencies.

daenney and others added 30 commits July 29, 2022 13:30
This allows the client/server to chose which elliptic curves they wish
to advertise, and in which order.

Fixes pion#474
VerifyConnection, if not nil, is called after normal certificate
verification/PSK and after VerifyPeerCertificate by either a TLS client
or server. If it returns a non-nil error, the handshake is aborted
and that error results.

If normal verification fails then the handshake will abort before
considering this callback. This callback will run for all connections
regardless of InsecureSkipVerify or ClientAuth settings.
The goal is to close the feature parity gap with stdlib's tls package.

Co-authored-by: Rachel Chen <rachel@chens.email>
Update lint scripts and CI configs.
The API is expected to be called with a new cert pool.

The deprecation has no suggested alternative.
Update lint scripts and CI configs.
Some SDPs emit uppercase hash names. This change makes the comparison
case insensitive.
Update lint scripts and CI configs.
Update lint scripts and CI configs.
The old code caused compilation errors
an was clearly not covered by any tests so far.
Update lint scripts and CI configs.
Use Go's built-in fuzzing tool instead of go-fuzz
Update github.com/pion/transport to v2
xiaokangwang and others added 15 commits February 3, 2023 15:44
This is a common behavior for WebRTC Peer on browser stack
where DoS resistance on DTLS level is redundant as this is
built into ICE.
This fixes an out of bounds read when we're unmarshalling the Server
Hello. This could cause us to panic.
This could cause us to panic when unmarshalling a Hello Verify request
message.
This adds a fuzz test to cover the DTLS handshake.

Co-Authored-By: Daniele Sluijters <daenney@users.noreply.github.com>
transport/v2 was a breaking change to that API
This pulls in the transport update that resolves the x/net
CVE-2022-41723 issue.
This pulls in the transport update that resolves the x/net
CVE-2022-41723 issue.
Udp pulls in pion/transport which got an update due to CVE-2022-41723.
Copy link

@thiagownt thiagownt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no look approval 🤞

@unity-ptrottier unity-ptrottier merged commit 74f6048 into unity Mar 8, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
9 participants