Changeset 1187:436e4342ecd0 in freeDiameter
- Timestamp:
- Jun 10, 2013, 1:04:50 PM (10 years ago)
- Branch:
- default
- Phase:
- public
- Files:
-
- 5 edited
Legend:
- Unmodified
- Added
- Removed
-
contrib/debian/changelog
r1177 r1187 28 28 * Upgraded SCTP code to comply with RFC 6458 29 29 * Using default secure Diameter port number 5658 as per RFC 6733 30 * Updated TLS code for performance improvements with new GNU TLS. 30 31 31 -- Sebastien Decugis <sdecugis@freediameter.net> Mon, 03 Jun 2013 14:20:05+080032 -- Sebastien Decugis <sdecugis@freediameter.net> Mon, 10 Jun 2013 12:03:59 +0800 32 33 33 34 freediameter (1.1.6) UNRELEASED; urgency=low -
doc/freediameter.conf.sample
r1181 r1187 31 31 # The port this peer is listening on for incoming TLS-protected connections (TCP and SCTP). 32 32 # See TLS_old_method for more information about TLS flavours. 33 # Note: we use TLS/SCTP instead of DTLS/SCTP at the moment. This will change in future version of freeDiameter. 33 34 # Default: 5658. Use 0 to disable. 34 35 #SecPort = 5658; 35 36 # freeDiameter 1.2.0 introduces the support of DTLS over SCTP (RFC6083) instead of TLS over SCTP (RFC3436),37 # as specified in RFC6733. If you need compatibility with older implementation that use TLS over SCTP, you38 # can open an additional SCTP server port using TLS/SCTP by specifying the following parameter.39 # Note that no TCP server is started on the following port.40 # Default: 0 (disabled). Use 3869 for compatibility with freeDiameter < 1.2.0.41 #SctpSec3436 = 0;42 36 43 37 # Use RFC3588 method for TLS protection, where TLS is negociated after CER/CEA exchange is completed … … 218 212 # Parameters that can be specified in the peer's parameter list: 219 213 # No_TCP; No_SCTP; No_IP; No_IPv6; Prefer_TCP; TLS_old_method; 220 # No_TLS; # assume transparent security instead of TLS 221 # SctpSec3436; # Use TLS/SCTP instead of DTLS/SCTP to protect SCTP associations with this peer. 214 # No_TLS; # assume transparent security instead of TLS. DTLS is not supported yet (will change in future versions). 222 215 # Port = 5658; # The port to connect to 223 216 # TcTimer = 30; -
libfdcore/fdd.l
r1180 r1187 246 246 (?i:"Port") { return PORT; } 247 247 (?i:"SecPort") { return SECPORT; } 248 (?i:"SctpSec3436") { return SEC3436; } 248 /* (?i:"SctpSec3436") { return SEC3436; } */ 249 249 (?i:"No_IPv6") { return NOIP6; } 250 250 (?i:"No_IP") { return NOIP; } -
libfdcore/p_cnx.c
r1186 r1187 283 283 if (nc->dotls) { 284 284 CHECK_FCT_DO( fd_cnx_handshake(cnx, GNUTLS_CLIENT, 285 (peer->p_hdr.info.config.pic_flags.sctpsec == PI_SCTPSEC_3436) ? ALGO_HANDSHAKE_3436 : ALGO_HANDSHAKE_DEFAULT,285 ALGO_HANDSHAKE_3436, 286 286 peer->p_hdr.info.config.pic_priority, NULL), 287 287 { -
libfdcore/server.c
r1181 r1187 54 54 struct cnxctx * conn; /* server connection context (listening socket) */ 55 55 int proto; /* IPPROTO_TCP or IPPROTO_SCTP */ 56 int secur; /* TLS is started immediatly after connection ? 0: no; 1: yes (TLS/TCP or DTLS/SCTP);2: yes (TLS/TCP or TLS/SCTP) */56 int secur; /* TLS is started immediatly after connection ? 0: no; 2: yes (TLS/TCP or TLS/SCTP) */ 57 57 58 58 pthread_t thr; /* The thread listening for new connections */ … … 361 361 /* Create the server on secure port */ 362 362 if (fd_g_config->cnf_port_tls) { 363 CHECK_MALLOC( s = new_serv(IPPROTO_SCTP, 1) );363 CHECK_MALLOC( s = new_serv(IPPROTO_SCTP, 2 /* Change when DTLS is introduced */) ); 364 364 CHECK_MALLOC( s->conn = fd_cnx_serv_sctp(fd_g_config->cnf_port_tls, empty_conf_ep ? NULL : &fd_g_config->cnf_endpoints) ); 365 365 fd_list_insert_before( &FD_SERVERS, &s->chain ); … … 368 368 369 369 /* Create the other server on 3436 secure port */ 370 if (fd_g_config->cnf_port_3436) {370 /*if (fd_g_config->cnf_port_3436) { 371 371 CHECK_MALLOC( s = new_serv(IPPROTO_SCTP, 2) ); 372 372 CHECK_MALLOC( s->conn = fd_cnx_serv_sctp(fd_g_config->cnf_port_3436, empty_conf_ep ? NULL : &fd_g_config->cnf_endpoints) ); 373 373 fd_list_insert_before( &FD_SERVERS, &s->chain ); 374 374 CHECK_POSIX( pthread_create( &s->thr, NULL, serv_th, s ) ); 375 } 375 }*/ 376 376 377 377 #endif /* DISABLE_SCTP */
Note: See TracChangeset
for help on using the changeset viewer.