Skip to content

Commit

Permalink
lavf/tls_mbedtls: add workaround for TLSv1.3 vs. verify=0
Browse files Browse the repository at this point in the history
As of mbedTLS 3.6.0 TLSv1.3 is enabled by default and certificate verification
is now mandatory. Our default configuration does not do verification, so
downgrade to 1.2 in these situations to avoid breaking it.

ref: Mbed-TLS/mbedtls#7075

Signed-off-by: Anton Khirnov <[email protected]>
  • Loading branch information
sfan5 authored and elenril committed Jun 18, 2024
1 parent ab8f703 commit c28e5b5
Showing 1 changed file with 8 additions and 0 deletions.
8 changes: 8 additions & 0 deletions libavformat/tls_mbedtls.c
Original file line number Diff line number Diff line change
Expand Up @@ -269,6 +269,14 @@ static int tls_open(URLContext *h, const char *uri, int flags, AVDictionary **op
goto fail;
}

#ifdef MBEDTLS_SSL_PROTO_TLS1_3
// mbedTLS does not allow disabling certificate verification with TLSv1.3 (yes, really).
if (!shr->verify) {
av_log(h, AV_LOG_INFO, "Forcing TLSv1.2 because certificate verification is disabled\n");
mbedtls_ssl_conf_max_tls_version(&tls_ctx->ssl_config, MBEDTLS_SSL_VERSION_TLS1_2);
}
#endif

// not VERIFY_REQUIRED because we manually check after handshake
mbedtls_ssl_conf_authmode(&tls_ctx->ssl_config,
shr->verify ? MBEDTLS_SSL_VERIFY_OPTIONAL : MBEDTLS_SSL_VERIFY_NONE);
Expand Down

0 comments on commit c28e5b5

Please sign in to comment.