Skip to content

FF138 Relnote: Certificate returns fingerprints #39010

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 6 commits into
base: main
Choose a base branch
from

Conversation

hamishwillee
Copy link
Collaborator

@hamishwillee hamishwillee commented Apr 7, 2025

FF138 adds support for the RTCCertificate.getFingerprints() method in https://bugzilla.mozilla.org/show_bug.cgi?id=1525241

This is draft, because I'd quite like a sanity check from the developers - asked in https://bugzilla.mozilla.org/show_bug.cgi?id=1525241

Related docs can be tracked in #38882

Copy link
Contributor

github-actions bot commented Apr 7, 2025

Preview URLs

Flaws (1)

Note! 1 document with no flaws that don't need to be listed. 🎉

URL: /en-US/docs/Mozilla/Firefox/Releases/138
Title: Firefox 138 for developers
Flaw count: 1

  • macros:
    • Macro produces link /en-US/docs/Web/HTML/Element/details which is a redirect
External URLs (1)

URL: /en-US/docs/Mozilla/Firefox/Releases/138
Title: Firefox 138 for developers

(comment last updated: 2025-04-11 11:20:26)


// Get the certificate fingerprints from the client.
const fingerprintsFromClient = rtcPeerConnection.certificate.getFingerprints();
Copy link
Collaborator Author

@hamishwillee hamishwillee Apr 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This was definitely wrong, because there is no RTCPeerConnection.certificate property.

You can either the RTCCertificate from the RTCPeerConnection.getConfiguration() (which gets your current configuration, as set up in the peer connection constructor) or from a certificate you generate using the static method and pass in.

I think the intent is that the peer connection gets created and creates you some certificates (or you create your own). You then exchange their fingerprints out of band, then start the connection up by creating offer etc. As part of all this DTLS gets setup and the fingerprints sent are used for identity verification.
If that is true, then this is OK - though it could be more informative. Following up in https://bugzilla.mozilla.org/show_bug.cgi?id=1525241

hamishwillee and others added 3 commits April 7, 2025 15:52
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Copy link
Contributor

This pull request has merge conflicts that must be resolved before it can be merged.

@github-actions github-actions bot added the merge conflicts 🚧 [PR only] label Apr 11, 2025
@github-actions github-actions bot removed the merge conflicts 🚧 [PR only] label Apr 11, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Content:Firefox Content in the Mozilla/Firefox subtree Content:WebAPI Web API docs size/s [PR only] 6-50 LoC changed
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants