Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Question] In TLS 1.2 client, VerifyMac fails, with bad record alert, after about 1-2 mins of good exchange #7883

Open
antonjfernando2021 opened this issue Aug 18, 2024 · 2 comments
Assignees

Comments

@antonjfernando2021
Copy link

Version

wolfssl 4.3.0

Description

Hi,
I have enabled these
#define DEBUG_WOLFSSL
#define WOLFSSL_EXTRA_ALERTS
I suspect our custom socket layer as primary cause, but wireshark and wolfssl logs/prints are all I got initially.
Would printing sequence numbers, from keys structure, to see if records are out of order, or dropped etc, help?

  • printf("(VerifyMac) peer_sequence_number_hi 0x%08x, peer_sequence_number_lo 0x%08x\n",
  • printf("(VerifyMac) sequence_number_hi 0x%08x, sequence_number_lo 0x%08x\n",
    any suggestions on what else I could print/log on client side, to find what might be contributing to bad record?
    Wireshark seems ok, no indication bad incoming tls packets.
    I know mine is an old release, I am curious if any verifymac related fixes went in near 4.3.0 release.
    Thanks,
@dgarske
Copy link
Contributor

dgarske commented Aug 19, 2024

Hi @antonjfernando2021 ,

I agree this sounds like a legitimate issue with data integrity. Can you tell us more about your transport and the hardware you are using? If you'd like to keep this discussion private please open a support ticket using an email to support at wolfssl dot com and reference this issue.

Updating your release would be a good idea in general and is a good experiment, however I am not aware of anything that would improve a MAC issue.

Thanks,
David Garske, wolfSSL

@dgarske
Copy link
Contributor

dgarske commented Aug 22, 2024

Hi @antonjfernando2021 ,

How goes the investigation?

Thanks,
David Garske, wolfSSL

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants