DTLS.Net was developed for use in an implementation of the Open Mobile Alliance's (OMA) Lightweight Machine to Machine protocol (LWM2M). For this reason it only supports the following cipher suites:
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
- TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
- TLS_PSK_WITH_AES_128_CCM_8
- TLS_PSK_WITH_AES_128_CBC_SHA256
DTLS2.Net was developed for use with Net-SNMP and an RSA certificate from the Windows Certificate Store and adds a new CipherSuite on the client side
- TLS_RSA_WITH_AES_256_CBC_SHA
Since the client is only required to serve for the above project it has several inherent limitations:
- No automatic retransmission
- No reordering of messages or fragments
- Does not verify Server Certificates (against CA)
- No resumption when using the New Session Ticket Extention
The server currently also has the following limitations:
- Does not verify client Certificates
- No support for fragmentation of handshake packets
Hopefully over time these will be implemented, in the meantime we hope this is still useful.
We welcome all contributions to this project and we give credit where it's due. Anything from enhancing functionality to improving documentation and bug reporting - it's all good.
Find out more in the contributor guide.
We would like to thank all of our current contributors.
- All code and documentation developed by Imagination Technologies Limited is licensed under the BSD 3-clause license.
- Bouncy Castle by The Legion of the Bouncy Castle is licensed under an adaptation of the MIT X11 License.