Copyright © 2005 voice-system.ro
Copyright © 2005 Cesc Santasusana
Copyright © 2006 enum.at
disable_tls
=integerlisten
=interfacetls_port_no
=numbertls_method
=valuetls_certificate
=filetls_private_key
=filetls_ca_list
=filetls_ciphers_list
=stringtls_verify_client
=number and
tls_require_client_certificate
=numbertls_verify_server
=numbertls_handshake_timeout
=number and
tls_send_timeout
=numbertls_client_domain_avp
=numbertls_server_domain, tls_client_domain
sectiondisable_tls
variablelisten
variabletls_port_no
variabletls_method
variabletls_certificate
variabletls_private_key
variabletls_ca_list
variabletls_ciphers_list
variabletls_verify_client & tls_require_client_certificate
variabletls_verify_server
variabletls_handshake_timeout &
tls_send_timeout
variabletls_client_domain_avp
variabletls_client_domain
and
tls_server_domain
blockTLS is an optional part of the OpenSER's core, not a module. TLS, as defined in SIP RFC 3261, is a mandatory feature for proxies and can be used to secure the SIP signalling on a hop-by-hop basis (not end-to-end). TLS works on top of TCP. DTLS, or TLS over UDP is already defined by IETF and may become available in the future.
The TLS support was originally developed by Peter Griffiths and posted as a patch on SER development mailing list. Thanks to Cesc Santasusana, several problems were fixed and some improvements were added.
The TLS support was simultaneously added in both projects. In SER, the support was committed in a separate "experimental" CVS tree, as patch to the main CVS tree. In OpenSER, the support was integrated directly into the CVS tree, as a built-in component, and is part of stable OpenSER since release >=1.0.0.
By the increased number of providers the SIP world is continuously growing. More users means more calls and more calls means a high probability for a user to receive calls from totally unknown people or, in the worst case, to receive unwanted calls. To prevent this, a defense mechanism must be adopted by the SIP provider. Since only the called user is fully able to classify a call as being unwanted, the SIP server, based on all information regarding the call should notify the user about the desirability of the call. Information like the caller domain, the received source or the incoming protocol can be very useful for a SIP server to establish the nature of the call.
As this information is quite limited, is very improbable for a server to be able detect the unwanted calls - there are many calls that it cannot predict anything about its status (neutral calls). So, instead on alerting the called user about unwanted calls, the server can notify the user about calls that are considered trusted - calls for which the server is 100% sure there are not unwanted.
So, a trust concept must be defined for SIP servers. Which calls are trusted and which are not? A call is trusted if the caller can be identify as a trustable user - a user about we have reliable information.
Since all the user from its domain are authenticated (or should be), a SIP server can consider all the calls generated by its user as trusted. Now we have to extend the trust concept to the multi-domain level. A mutual agreement, between several domains, can establish a trusting relationship. So, a domain (called A) will consider also as trusted calls all the calls generated by user from a different domain (called B) and vice-versa. But just an agreement is not enough; since the authentication information is strictly limited to a domain (a domain can authenticate only its own user, not the user from other domains), there is still the problem of checking the authenticity of the caller - he can impersonate (by a false FROM header) a user from a domain that is trusted.
The answer to this problem is TLS (Transport Layer Security). All calls via domain A and domain B will be done via TLS. Authentication in origin domain plus TLS transport between domains will make the call 100% trusted for the target domain.
For such a mechanism to work, the following requirements must be met:
all UA must have set as outbound proxy their home server.
all SIP servers must authenticated all the calls generated by their own users.
all SIP servers must relay the calls generated be their user to a trusted domain via TLS.
Based on this, a server can classify as trusted a call for one of its user only if the call is also generated by one of its users or is the call is received from a trusted domain ( which is equivalent with a call received via TLS). Untrusted call will be calls received from users belonging to untrusted domains or from users from trusted domains, but whose calls are not routed via their home server (so, they are not authenticated by there home servers).
Once the server is able to tell if the call is trusted or not, the still open issue is about the mechanism used by server to notify the called user about the nature of the incoming call.
One way to do it is by remotely changing the ringing type of the called user's phone. This can be done by inserting special header into the INVITE request. Such feature is supported by now by several hardphones like CISCO ATA, CISCO 7960 and SNOM. This phones can change their ringing tone based on the present or content of the "Alert-Info" SIP header as follows:
CISCO ATA - it has 4 pre-defined ringing types. The Alert-Info header must look like "Alert-info: Bellcore-drX EOH"" where X can be between 1 and 4. Note that 1 is the phone default ringing tone.
CISCO 7960 - it has 2 pre-defined ringing types and the possibility of uploading new ones. The "Alert-Info" header must look like "Alert-info: X EOH" where X can be whatever number. When this header is present, the phones will not change the ringing tone, but the ringing pattern. Normally, the phone rings like [ring.........ring..........ring] where [ring] is the ringing tone; if the header is present, the ringing pattern will be [ring.ring.........ring.ring........]. So, to be able to hear some difference between the two patterns (and not only as length), its strongly recommended to have a highly asymmetric ringing type (as the pre-defined are not!!).
SNOM - The "Alert-Info" header must look like "Alert-info: URL EOH"" where URL can be a HTTP URL (for example) from where the phone can retrieve a ringing tone.
A script example which implements this scenario can be found in Section 1.7.
To compile OpenSER with the TLS support, the environment variable TLS must be set. Note that this is required for all make commands (and not only for compiling). To set the variable, there are several ways to do it:
run all make commands like "TLS=1 make all|clean|install|etc"
before starting, export the TLS variable like "export TLS=1" (in bash) and use the make commands as usual. NOTE: the exported variable will be available only in current shell!
comment (to disable) or uncomment (to enable) the "TLS=1" line in the Makefile file; use the make commands as usual without any limitations.
OpenSER TLS support requires the following packages:
openssl or libssl >= 0.9.6
openssl-dev or libssl-dev
TLS provides for strong authentication mechanism, as well as encryption following authentication. Of course, null encryption can be used, as well as weak authentication mechanisms (for example, anonymous, that is, no authentication).
How does verification work? Verification is the process by which the authentication data provided by the peers is checked. This data consists usually of a peer certificate, plus a chain of trusted certification authorities. If for whatever reason, either of the peers thinks that the handshake is not valid, the ssl connection is not established. The reasons could be many: untrusted server certificate, too-weak algorithm, invalid client cert, no client authentication, ...
This paragraph describe how to generate all the needed keys and certificates for establishing TLS connection with OpenSER. The described TLS setup is based on the assumption that we run our own certificate authority (CA) and we want to connect via TLS several OpenSER servers (SIP domain).
In this setup the private key is not encrypted. The client and server keys must not be encrypted (or else OpenSER will ask you for a password on startup or will fail to load the certificates), but you should use a password at least for your CA private key. |
This part must be done only once, disregarding the number of how many interconnected OpenSER's we want to have.
Using "openserctl tls rootCA", you may create a local root CA.
The script will produce the private key (which will be used to sign client/server certificates) and the self-signed certificate authority.
This part must be done for each OpenSER server interconnected into your TLS enabled network: build a certificate request and sign it with a root CA (yourself or from third party).
For this purpose you may use the "openserctl tls userCERT"
The output of the script will be a directory containing all needed TLS files for configuring the OpenSER proxy (private key, signed certificate and CA list)
Append to the CA list file all the CA root certificates ( this list must contain all CA root certificates to be accepted by your server):
If you use the "openserctl tls userCERT", it will create an one element CA list with the CA used to sign the certificate.
To add more CAs to your list, just do:
cat add_cacert.pem >> calist.pem
Now copy intended OpenSER certificate, private key and ca list file (basically the whole content of the openserX directory) to your intended machine in some directory (which will be further refer by path "path").
There are some OpenSER TLS specific parameter that must be set up in OpenSER configuration file to use the certificate:
set up ser.cfg to use the certificate :
tls_certificate=/path/cert.pem
set up ser to use the private key :
tls_private_key=/path/privkey.pem
set up ser to use the CA list (optional - make sens only if tls_verify is turned on)
tls_ca_list=/path/calist.pem
The "tls_verify_server", "tls_verify_client" and "tls_require_client_certificate" are OpenSER-names for the OpenSSL defined flags:
SSL_VERIFY_PEER is tls_verify_client/tls_verify_server
SSL_VERIFY_FAIL_IF_NO_PEER_CERT is tls_require_client_certificate (tls_require_client_certificate is only used if tls_verify_client=1)
If your OpenSER is acting as a server (incoming TLS connections), it will always send its server-side certificate to the client. If tls_verify_client is disabled (set to 0), your OpenSER will not request the client a client-certificate. This means that the client is not authenticated. If tls_verify_client=1, your OpenSER (the server) sends a client-certificate request to the client. But the client is free to not provide any. In this case, tls_require_client_certificate comes into play:
tls_require_client_certificate=0 - the verification process will succeed if the client does not provide a certificate, or if it provides one, it verifies correctly against the server's list of trusted certification authorities.
tls_require_client_certificate=1 - the verification process will only succeed if the client provides a certificate and this verifies correctly against the server's list of trusted CAs.
If your OpenSER is acting as a client (outgoing TLS connections), it will always receive a certificate from the peer. If tls_verify_server is disabled (set to 0), your OpenSER will not verifiy the certificate and allows TLS connections to servers which do not present a valid certificate. If tls_verify_server=1, your OpenSER (the client) verifies the server certificate and will close the TLS connection if the server certificate is not valid.
For more details see page man verify(1).
All these parameters can be used from the openser.cfg file, to configure the behavior of OpenSER-TLS.
disable_tls
=integerDisables TLS (no server is created on the listen addresses, no outgoing connections can be set up). A non 0 value means disable.
It's usable only if TLS support was compiled.
Default value is 1 (TLS disabled).
listen
=interfaceNot specific to TLS. Allows to specify the protocol (udp, tcp, tls), the IP address and the port where the listening server will be.
tls_port_no
=numberSets the default TLS listening port.
It's usable only if TLS support was compiled.
Default value is 5061.
tls_method
=valueSets the TLS protocol method which can be:
TLSv1 - means OpenSER will accept only TLSv1 connections (rfc3261 conformant).
SSLv3 - means OpenSER will accept only SSLv3 connections
SSLv2 - means OpenSER will accept only SSLv2 connections (almost all old clients support this).
SSLv23 - means OpenSER will accept any of the above methods, but the initial SSL hello must be v2 (in the initial hello all the supported protocols are advertised enabling switching to a higher and more secure version). The initial v2 hello means it will not accept connections from SSLv3 or TLSv1 only clients.
It's usable only if TLS support was compiled.
Default value is SSLv23.
Best is to use SSLv23, for extended compatibility. Using any of the other will restrict the version to just that one version. In fact, SSLv2 is disabled in the source code; to use it, you need to edit tls/tls_init.c |
If you want RFC3261 conformance and all your clients support TLSv1 (or you are planning to use encrypted "tunnels" only between different OpenSER proxies) use TLSv1. If you want to support older clients use SSLv23 (in fact most of the applications with SSL support use the SSLv23 method).
tls_certificate
=filePublic certificate file for OpenSER. It will be used as server-side certificate for incoming TLS connections, and as a client-side certificate for outgoing TLS connections.
See previous chapter Section 1.5.3 for more information.
It's usable only if TLS support was compiled.
Default value is "CFG_DIR/cert.pem".
tls_private_key
=filePrivate key of the above certificate. I must be kept in a safe place with tight permissions!
See previous chapter Section 1.5.3 for more information.
It's usable only if TLS support was compiled.
Default value is "CFG_DIR/cert.pem".
tls_ca_list
=fileList of trusted CAs. The file contains the certificates accepted, one after the other. It MUST be a file, not a folder.
See previous chapter Section 1.5.3 for more information.
It's usable only if TLS support was compiled.
Default value is "".
tls_ciphers_list
=stringYou can specify the list of algorithms for authentication and encryption that you allow. To obtain a list of ciphers and then choose, use the openssl application:
openssl ciphers 'ALL:eNULL:!LOW:!EXPORT'
Do not use the NULL algorithms (no encryption) ... only for testing!!! |
It's usable only if TLS support was compiled.
It defaults to the OpenSSL default ciphers.
tls_verify_client
=number and
tls_require_client_certificate
=numberTechnically, tls_verify_client activates SSL_VERIFY_PEER in the ssl_context. tls_require_client_certificate does the same with SSL_VERIFY_FAIL_IF_NO_PEER_CERT, which is only possible if SSL_VERIFY_PEER is also turned on.
These two parameters are used for incoming TLS connections, where OpenSER acts as server.
See previous chapter Section 1.5.4 for more information.
It's usable only if TLS support was compiled.
Default value for both is 1.
tls_verify_server
=numberTechnically, tls_verify_server activates SSL_VERIFY_PEER in the ssl_context.
This parameter is used for outgoing TLS connections, where OpenSER acts as client.
See previous chapter Section 1.5.4 for more information.
It's usable only if TLS support was compiled.
Default value is 1.
tls_handshake_timeout
=number and
tls_send_timeout
=numberTimeouts ... advanced users only
It's usable only if TLS support was compiled.
Default value for both is 30.
tls_client_domain_avp
=numberThis sets the interger AVP used for name based TLS server domains (please see tls_client_domain for more details). Setting the value to 0 disables name based TLS client domains.
It's usable only if TLS support was compiled.
Default value is 0.
tls_server_domain, tls_client_domain
sectionIf you only run one domain, the main one is enough. If you are running several TLS servers (that is, you have more than one listen=tls:ip:port entry in the config file), you can specify some parameters for each of them separately (not all the above).
The wording 'TLS domain' means that this TLS connection will have different parameters than another TLS connection (from another TLS domain). Thus, TLS domains must are not directly related to different SIP domains, although they are often used in common. Depending on the direction of the TLS handshake, a TLS domain is called 'client domain' (=outgouing TLS connection) or 'server domain' (= incoming TLS connection).
For example, TLS domains can be used in virtual hosting scenarios with TLS. OpenSER offers SIP service for multiple domains, e.g. atlanta.com and biloxi.com. Altough both domains will be hosted a single SIP proxy, the SIP proxy needs 2 certificates: One for atlanta.com and one for biloxi.com. For incoming TLS connections, the SIP proxy has to present the respective certificate during the TLS handshake. As the SIP proxy does not have received a SIP message yet (this is done after the TLS handshake), the SIP proxy can not retrieve the target domain (which will be usually retrieved from the domain in the request URI). Thus, distinction for these domains must be done by using multiple sockets. The socket on which the TLS connection is received, identifies the respective domain. Thus the SIP proxy is able to present the proper certificate.
For outgoing TLS connections, the SIP proxy usually has to provide a client certificate. In this scenario, socket based distinction is not possible as there is no dedicated outgoing socket. Thus, the certificate selection (selection of the proper TLS client domain) will be name based. For this purpose, TLS client domains can be associated with a name (e.g. the domain can be used as name). If the SIP proxy establishes a new outgoing TLS connection, it checks for the TLS client domain AVP (parameter tls_client_domain_avp). If this AVP is set (e.g. in OpenSER.cfg), OpenSER searches for a TLS client domain with the same name and uses the certificates defined in the respective tls_client_domain section.
TLS client domains can also be socket based. If name based domains are disabled or no name based AVP is found, OpenSER searches for socket based TLS client domains. In this case the mapping between to the TLS client domain is done based on the destination socket of the underlying outgoing TCP connection.
Note: If there is already an existing TLS connection to the remote target, it will be reused wether the TLS client domain AVP matches or not.
NOTE: Make sure to also configure OpenSER to listen on the specified IP:port.
NOTE: Except tls_handshake_timeout and tls_send_timeout all TLS parameters can be set per TLS domain. If a parameter is not explicit set, the default value will be used.
NOTE: The tls_verify_client and tls_require_client_certificate options can only be configured in TLS server domains, whereas the tls_verify_server option is only valid for configuring TLS client domains.
It's usable only if TLS support was compiled.
Example 1-13. Usage of tls_client_domain
and
tls_server_domain
block
... listen=tls:IP_2:port2 listen=tls:IP_3:port4 ... # set the TLS client domain AVP tls_client_domain_avp = 400 ... # socket based TLS server domains (for virtual SIPS hosting) tls_server_domain[IP_2:port2] { #specify parameters for a domain in particular, otherwise, #it will use the default values. tls_certificate = "/certs/atlanta.com/cert.pem" tls_private_key = "/certs/atlanta.com/privkey.pem" tls_ca_list = "/certs/wellknownCAs" tls_method=tlsv1 } tls_server_domain[IP_3:port3] { tls_certificate = "/certs/biloxy.com/cert.pem" tls_private_key = "/certs/biloxy.com/privkey.pem" tls_ca_list = "/certs/wellknownCAs" tls_method=tlsv1 tls_verify_client = 1 tls_require_client_certificate = 1 } # name based TLS client domains (for virtual SIPS hosting) tls_client_domain["atlanta.com"] { tls_certificate = "/certs/atlanta.com/cert.pem" tls_private_key = "/certs/atlanta.com/privkey.pem" tls_ca_list = "/certs/wellknownCAs" tls_method=tlsv1 tls_verify_server = 1 } tls_client_domain["biloxi.com"] { tls_certificate = "/certs/biloxy.com/cert.pem" tls_private_key = "/certs/biloxy.com/privkey.pem" tls_ca_list = "/certs/wellknownCAs" tls_method=tlsv1 tls_verify_server = 0 } # socket based TLS server domains (for TLS based downstream from GW provider) tls_server_domain[IP_5:port5] { tls_certificate = "/certs/local/cert.pem" tls_private_key = "/certs/local/privkey.pem" tls_ca_list = "/certs/GWproviderSelfSignedCA" tls_method=tlsv1 # TLS needed only for encryption, access is restricted via # IP access lists tls_verify_client = 0 } # socket based TLS client domains (for TLS based upstream to GW provider) # GW IP: 1.2.3.4, GW port: 6677 tls_client_domain[1.2.3.4:6677] { tls_certificate = "/certs/local/cert.pem" tls_private_key = "/certs/local/privkey.pem" tls_ca_list = "/certs/GWproviderSelfSignedCA" tls_method=tlsv1 # TLS needed only for encryption, access is restricted via # IP access lists tls_verify_server = 0 } ... route{ ... # calls to other SIP domains # set the proper SSL context (certificate) for local hosted domains avp_write("$fd","$avp(i:400)"); t_relay(); # uses NAPTR and SRV lookups exit; ... # calls to the PSTN GW t_relay("tls:1.2.3.4:6677"); exit; ...
IMPORTANT: The TLS support is based on TCP, and for allowing OpenSER to use TCP, it must be started in multi-process mode. So, there is a must to have the "fork" parameter set to "yes":
NOTE: Since the TLS engine is quite memory consuming, increase the used memory by the run time parameter "-m" (see OpenSER -h for more details).
fork = yes
Example 1-14. Script with TLS support
# ----------- global configuration parameters ------------------------ debug=3 fork=yes log_stderror=no check_via=no dns=no rev_dns=no listen=udp:_your_serv_IP_:5060 listen=tls:_your_serv_IP_:5061 children=4 #TLS specific settings tls_certificate="/path/openserX_cert.pem" tls_private_key="/path/privkey.pem" tls_ca_list="/path/calist.pem" tls_verify=on tls_require_client_certificate=on alias=_DNS_ALIAS_ # ------------------ module loading ---------------------------------- loadmodule "modules/sl/sl.so" loadmodule "modules/rr/rr.so" loadmodule "modules/maxfwd/maxfwd.so" loadmodule "modules/mysql/mysql.so" loadmodule "modules/usrloc/usrloc.so" loadmodule "modules/registrar/registrar.so" loadmodule "modules/tm/tm.so" loadmodule "modules/auth/auth.so" loadmodule "modules/auth_db/auth_db.so" loadmodule "modules/textops/textops.so" loadmodule "modules/uri_db/uri_db.so" loadmodule "modules/mi_fifo/mi_fifo.so" # ----------------- setting module-specific parameters --------------- # -- mi_fifo params -- modparam("mi_fifo", "fifo_name", "/tmp/openser_fifo") # -- auth_db params -- modparam("auth_db", "db_url", "sql_url") modparam("auth_db", "password_column", "password") modparam("auth_db", "calculate_ha1", 1) # -- registrar params -- # no multiple registrations modparam("registrar", "append_branches", 0) # -- rr params -- # add value to ;lr param to make some broken UAs happy modparam("rr", "enable_full_lr", 1) # ------------------------- request routing logic ------------------- # main routing logic route{ # initial sanity checks if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); exit; }; # if somene claims to belong to our domain in From, # challenge him (skip REGISTERs -- we will chalenge them later) if (from_uri==myself) { setflag(1); if ( is_method("INVITE|SUBSCRIBE|MESSAGE") && !(src_ip==myself) ) { if (!(proxy_authorize( "domA.net", "subscriber" ))) { proxy_challenge("domA.net","0"/*no-qop*/); exit; }; if (!check_from()) { log("LOG: From Cheating attempt in INVITE\n"); sl_send_reply("403", "That is ugly -- use From=id next time (OB)"); exit; }; }; # non-REGISTER from other domain } else if ( is_method("INVITE") && uri!=myself ) { sl_send_reply("403", "No relaying"); exit; }; /* ******** do record-route and loose-route ******* */ if (!is_method("REGISTER")) record_route(); if (loose_route()) { append_hf("P-hint: rr-enforced\r\n"); route(1); exit; }; /* ******* check for requests targeted out of our domain ******* */ if ( uri!=myself ) { append_hf("P-hint: OUTBOUND\r\n"); if (uri=~".*@domB.net") { t_relay("tls:domB.net:5061"); } else if (uri=~".*@domC.net") { t_relay("tls:domC.net:5061"); } else { route(1); }; exit; }; /* ******* divert to other domain according to prefixes ******* */ if (!is_method("REGISTER")) { if ( uri=~"sip:201") { strip(3); sethost("domB.net"); t_relay("tls:domB.net:5061"); exit; } else if ( uri=~"sip:202" ) { strip(3); sethost("domC.net"); t_relay("tls:domC.net:5061"); exit; }; }; /* ************ requests for our domain ********** */ if (is_method("REGISTER")) { if (!www_authorize( "domA.net", "subscriber" )) { # challenge if none or invalid credentials www_challenge( "domA.net" /* realm */, "0" /* no qop -- some phones can't deal with it */); exit; }; if (!check_to()) { log("LOG: To Cheating attempt\n"); sl_send_reply("403", "That is ugly -- use To=id in REGISTERs"); exit; }; # it is an authenticated request, update Contact database now if (!save("location")) { sl_reply_error(); }; exit; }; # native SIP destinations are handled using USRLOC DB if (!lookup("location")) { # handle user which was not found sl_send_reply("404", "Not Found"); exit; }; # remove all present Alert-info headers remove_hf("Alert-Info"); if (is_method("INVITE") && (proto==tls || isflagset(1))) { append_hf("Alert-info: 1\r\n"); # cisco 7960 append_hf("Alert-info: Bellcore-dr4\r\n"); # cisco ATA append_hf("Alert-info: http://foo.bar/x.wav\r\n"); # snom }; # do forwarding if (!t_relay()) { sl_reply_error(); }; #end of script }
It contains configuration variables for OpenSER's TLS (timeouts, file paths, etc).
Initialization related functions and parameters.
extern SSL_CTX *default_client_ctx;
The ssl context is a member of the TLS domain strcuture. Thus, every TLS domain, default and virtual - servers and clients, have its own SSL context.
int init_tls(void);
Called once to pre_initialize the tls subsystem, from the main(). Called before parsing the configuration file.
int init_tls(void);
Called once to initialize the tls subsystem, from the main(). Called after parsing the configuration file.
int tls_init(struct socket_info *c);
Called once for each tls socket created, from main.c
Wrapper functions around the shm_* functions. OpenSSL uses non-shared memory to create its objects, thus it would not work in OpenSER. By creating these wrappers and configuring OpenSSL to use them instead of its default memory functions, we have all OpenSSL objects in shared memory, ready to use.
Each TLS connection, incoming or outgoing, creates an SSL * object, where configuration inherited from the SSL_CTX * and particular info on that socket are stored. This SSL * structure is kept in OpenSER as long as the connection is alive, as part of the "struct tcp_connection *" object:
... struct tcp_connection *c; SSL *ssl; /*create somehow SSL object*/ c->extra_data = (void *) ssl; ssl = (SSL *) c->extra_data; ...
int tls_tcpconn_init( struct tcp_connection *c, int fd);
Called when new tcp connection is accepted
void tls_tcpconn_clean( struct tcp_connection *c);
Shuts down the TLS connection.
size_t tls_blocking_write( struct tcp_connection *c, int fd, const char *buf, size_t len);
Writes a memory chunk in blocking mode (syncron).
size_t tls_read( struct tcp_connection *c);
Reads from a TLS connection. Return the number of bytes read.
void tls_tcpconn_clean( struct tcp_connection *c);
Shuts down the TLS connection.
extern struct tls_domain *tls_default_server_domain;
The default TLS server domain.
extern struct tls_domain *tls_default_client_domain;
The default TLS client domain.
extern struct tls_domain *tls_server_domains;
List with defined server domains.
extern struct tls_domain *tls_client_domains;
List with defined client domains.
struct tls_domain *tls_find_server_domain(struct ip_addr *ip, unsigned short port);
Find a TLS server domain with given ip and port (local listening socket).
struct tls_domain *tls_find_client_domain(struct ip_addr *ip, unsigned short port);
Find TLS client domain with given ip and port (socket of the remote destination).
struct tls_domain *tls_find_client_name(str name);
Find TLS client domain with given name.
struct tls_domain *tls_new_domain(int type);
Creates new TLS: allocate memory, set the type and initialize members
int tls_new_server_domain(struct ip_addr *ip, unsigned short port);
Creates and adds to the list of TLS server domains a new domain.
int tls_new_client_domain(struct ip_addr *ip, unsigned short port);
Creates and adds to the list of TLS client domains a new socket based domain.
int tls_new_client_domain_name(char *s, int len);
Creates and adds to the list of TLS client domains a new name based domain.
Use one (the most appropriate) of the OpenSER mailing lists:
User Mailing List - http://openser.org/cgi-bin/mailman/listinfo/users
Developer Mailing List - http://openser.org/cgi-bin/mailman/listinfo/devel
Remember: first at all, check if your question wasn't already answered.
Accumulate as much as possible information (OpenSER version, openser -V output, your OS (uname -a), OpenSER logs, network dumps, core dump files, configuration file) and send a mail to http://openser.org/cgi-bin/mailman/listinfo/devel