1
0
mirror of https://github.com/coturn/coturn.git synced 2025-10-30 06:20:59 +01:00

1677 Commits

Author SHA1 Message Date
tyranron
40edfd6d79
Add README 2021-04-12 17:15:21 +03:00
Mészáros Mihály
7756c5da8e
Revert cmake changes until we don't fix them 2021-04-08 01:08:30 +02:00
Mészáros Mihály
54d8012f79
Add OPENSSL_INCLUDE_DIR env 2021-04-08 00:23:56 +02:00
Mészáros Mihály
bc246843b3
Change OPENSSL_ROOT_DIR 2021-04-07 23:52:02 +02:00
Mészáros Mihály
e1bb2e32f6
Remove g++ and add env OPENSSL_ROOT_DIR 2021-04-07 23:28:53 +02:00
Mészáros Mihály
8fac7d02c9
Merge pull request #741 from KangLin/cmake
CMake: add turnadmin etc
2021-04-07 21:34:12 +02:00
tyranron
3bad03d825
Fix 2021-04-07 18:16:04 +03:00
tyranron
0aa5c806c7
Fixes 2021-04-07 17:56:38 +03:00
tyranron
497be2cdd6
Bootstrap toolchain and CI pipeline 2021-04-07 14:26:50 +03:00
KangLin
da60faca1d Modify debug flag 2021-04-06 14:27:01 +08:00
KangLin
bd46483efa Modify INSTALL 2021-04-05 11:26:49 +08:00
tyranron
4f341d3428
Build mongo-c-driver from sources for Debian 2021-04-02 13:29:49 +03:00
tyranron
50c2f949ae
Restore version test 2021-04-01 17:54:24 +03:00
tyranron
5d196ff1d0
Add 'debian' image and run as non-root 2021-04-01 17:41:55 +03:00
tyranron
a7b15d2222
Bootstrap image 2021-04-01 12:01:24 +03:00
KangLin
9f6defdac4 CMake: add -Wno-deprecated-declarations 2021-03-29 07:22:12 -07:00
KangLin
33dd25e36c CMake: add cmake to ci 2021-03-29 07:13:16 -07:00
KangLin
86f1da7bab CMake: install documents, configure, script files 2021-03-29 01:30:28 -07:00
KangLin
2110991cd6 CMake: add turnadmin 2021-03-28 21:32:47 -07:00
KangLin
73da474804 CMake: add runtime install 2021-03-28 20:19:15 -07:00
Mark Hills
8f1908d7bd A use-after-free can occur on the SSL_ctx on a busy system
When openssl_load_certificates() is called as a result of USR2
signal, it has the effect of SSL_free() on certificates.

But pointers to these certificates are borrowed by the ioa_engines
where they are used for new connections.

The tls_mutex when loading the certificates does not prevent this use
because it's released before despatching asynchronous events to each
ioa_engine asking them to pick up the new SSL context.

So there is a race; if a new connection arrives quickly after
openssl_load_certificates() but before the tls_ctx_update_ev.

This patch resolves this using OpenSSL's own fine grained locking.
The ioa_engines now 'copy' the SSL context (actually a refcounted copy)
2021-03-23 16:02:06 +00:00
Mark Hills
da5cda7761 Do not take a copy of the SSL context
When SSL certificates are renewed during runtime (via SIGUSR2),
e->dtls_ctx is replaced with a context based on the new certificate.
But this code continues to operate on its own borrowed pointer.

This is clearly visible using valgrind, but the bug is subtle and not
always noticed at runtime, possibly due to some fortunate re-use of
memory.

At the point of SSL_new():

==28413== Thread 5:
==28413== Invalid read of size 8
==28413==    at 0x4F6198F: SSL_new (in /lib/libssl.so.1.1)
==28413==    by 0x137A72: dtls_server_input_handler (dtls_listener.c:291)
==28413==    by 0x137A72: handle_udp_packet (dtls_listener.c:443)
==28413==    by 0x138153: udp_server_input_handler (dtls_listener.c:728)
==28413==    by 0x4FC499E: ??? (in /usr/lib/libevent_core-2.1.so.7.0.0)
==28413==    by 0x4FC50AF: event_base_loop (in /usr/lib/libevent_core-2.1.so.7.0.0)
==28413==    by 0x121F34: run_events (netengine.c:1579)
==28413==    by 0x121F34: run_general_relay_thread (netengine.c:1707)
==28413==    by 0x40517B6: start (pthread_create.c:195)
==28413==    by 0x40538EF: ??? (clone.s:22)
==28413==  Address 0x49a75e0 is 0 bytes inside a block of size 1,024 free'd
==28413==    at 0x48A074F: free (vg_replace_malloc.c:540)
==28413==    by 0x4F5F6F1: SSL_CTX_free (in /lib/libssl.so.1.1)
==28413==    by 0x11CEC4: set_ctx (mainrelay.c:3104)
==28413==    by 0x11D233: openssl_load_certificates (mainrelay.c:3173)
==28413==    by 0x11D328: reload_ssl_certs (mainrelay.c:3190)
==28413==    by 0x4FC4601: ??? (in /usr/lib/libevent_core-2.1.so.7.0.0)
==28413==    by 0x4FC50AF: event_base_loop (in /usr/lib/libevent_core-2.1.so.7.0.0)
==28413==    by 0x122582: run_events (netengine.c:1579)
==28413==    by 0x122582: run_listener_server (netengine.c:1603)
==28413==    by 0x110BB8: main (mainrelay.c:2536)
==28413==  Block was alloc'd at
==28413==    at 0x489F72A: malloc (vg_replace_malloc.c:309)
==28413==    by 0x4DFA2C6: CRYPTO_zalloc (in /lib/libcrypto.so.1.1)
==28413==    by 0x4F5F79E: SSL_CTX_new (in /lib/libssl.so.1.1)
==28413==    by 0x11CA80: set_ctx (mainrelay.c:2875)
==28413==    by 0x11D233: openssl_load_certificates (mainrelay.c:3173)
==28413==    by 0x110A19: openssl_setup (mainrelay.c:3139)
==28413==    by 0x110A19: main (mainrelay.c:2396)
==28413==
2021-03-23 16:02:06 +00:00
Mark Hills
bdf27616ba Do not mutate something which the DTLS listener server does not own
Multiple DTLS listener servers are created, and server->dtls_ctx is
the same object shared between them.

Set these callbacks once, and logically this is at the point where the
SSL context is created.
2021-03-23 16:02:06 +00:00
Mészáros Mihály
e2d71ce6bf Add mereged PR-s to Changelog 2021-03-23 10:03:34 +01:00
Mészáros Mihály
e343e61a67
Merge pull request #718 from dcharbonnier/master
mongoc version 1.17.4
2021-03-23 09:48:47 +01:00
Mészáros Mihály
c55331dad2
Merge pull request #679 from rubo77/patch-1
Readme.turnserver: how to run server as a daemon
2021-03-23 09:45:34 +01:00
Mészáros Mihály
97c93725af
Merge pull request #704 from hills/configure-exit
Packaging scripts can miss out on these errors
2021-03-23 09:41:28 +01:00
Mészáros Mihály
27cd04194e
Merge pull request #717 from marcoschum/patch-1
Update turnserver.conf
2021-03-23 09:35:42 +01:00
Mészáros Mihály
31c936d51d
Merge pull request #721 from KangLin/cmake
Add to support cmake
2021-03-23 09:31:59 +01:00
Mészáros Mihály
7340bf8e50
Merge pull request #727 from JoKoT3/master
Support older mysql client version in configure
2021-03-23 09:28:06 +01:00
Mészáros Mihály
6a5d067d7c
Merge pull request #703 from hills/no-stdout-log
Restore no_stdout_log behaviour
2021-03-23 09:18:17 +01:00
Mészáros Mihály
2204778ce1 Replace keep-address-family with allocation-default-address-family 2021-03-12 23:05:18 +01:00
Mészáros Mihály
e2c99c6803 Remove extra new line in error 2021-03-11 22:15:22 +01:00
Jonathan GIBERT
6994972726 Support older mysql client version in configure 2021-03-04 17:54:51 +01:00
KangLin
677e5dc5d3 Add cmake 2021-02-26 09:02:50 +08:00
release-it
33aa2e6ec5 mongoc version 1.17.4 2021-02-24 19:09:46 +01:00
marcoschum
cfb03bb934
Update turnserver.conf
fixed typo mor --> more
2021-02-24 09:19:03 +01:00
Mark Hills
a7dcdc6da9 Packaging scripts can miss out on these errors
This script looks like it's designed to use a portable subset of
sh; I'm not aware of any portability problems of this patch.
2021-01-25 15:08:55 +00:00
Mark Hills
9bcc898b05 Restore no_stdout_log behaviour
In commit 599a61ee this was removed, by accident it could seem.
2021-01-25 09:31:47 +00:00
Ruben Barkow-Kuder
5bb25dbfaf
Update README.turnserver 2021-01-22 06:20:20 +01:00
Mészáros Mihály
b58166cc90
Fixes #692 2021-01-18 10:31:25 +01:00
Mészáros Mihály
907f1ec9a8 Add changelog PR #687 2021-01-14 21:18:35 +01:00
Mészáros Mihály
7abc3541e4
Merge pull request #687 from wuelcas/improve-doc-for-long-term-credentials-with-redis
Add hash algorithm for key value to redis userdb schema docs
2021-01-14 20:44:45 +01:00
Wuelber Castillo
a767115055 Add hash algorithm for key value to redis userdb schema 2021-01-14 09:57:10 -06:00
Mészáros Mihály
e5d4e62dec Fix typo "finsihed" reported by Felipe Cecagno 2021-01-14 15:14:53 +01:00
Mészáros Mihály
cc637d2db9 Uneccessary semicolon 2021-01-14 15:06:53 +01:00
Mészáros Mihály
57180ab60a
Merge pull request #684 from brevilo/brevilo-define-missing-v111
Define OPENSSL_VERSION_1_1_1 on systems where it doesn't (yet) exist
2021-01-13 10:07:46 +01:00
brevilo
a52df6cafb
Define OPENSSL_VERSION_1_1_1 on systems where it doesn't (yet) exist
Otherwise preprocessor logic will fail and cause incompatible pointer type issues (by using wrong callback API)
2021-01-13 01:54:25 +01:00
Mészáros Mihály
060bf18787 Changelog for CVE-2020-26262 4.5.2 2021-01-10 20:59:55 +01:00
Mészáros Mihály
abfe1fd08d Merge branch 'advisory-fix-1' CVE-2020-26262 2021-01-10 20:59:14 +01:00