[OpenSIPS-Users] TLS call failed

Bogdan-Andrei Iancu bogdan at voice-system.ro
Thu Feb 4 10:34:37 CET 2010


Hi Steven,

For the NOKIA N97, could you post the entire log (debug 4) for the 
INVITE part (covering the receiving of the INVITE also) ?

Regards,
Bogdan

doolin wu wrote:
> Hello,
>  
> I'm trying use TLS feature of OpenSIPS-1.5-tls. TLS was 
> configured and server run successfully.
> I tried to make 2 SIP UAs work with my OpenSIPS-1.5-tls, but all of 
> them are failed.
> Here is my settings:
>     >Server:
>     tls_verify_server = 0
>     tls_verify_client = 0
>     tls_require_client_certificate = 0
>     tls_method = TLSv1
>     tls_certificate = 
> "/usr/local/opensips.1.5.tls/etc/opensips/tls/user/user-cert.pem"
>     tls_private_key = 
> "/usr/local/opensips.1.5.tls/etc/opensips/tls/user/user-privkey.pem"
>     tls_ca_list = 
> "/usr/local/opensips.1.5.tls//etc/opensips/tls/user/user-calist.pem"
>  
>     >Client:
>     The self-signed rootCA (tls\rootCA\cacert.pem)  was imported in to 
> client successfully
>  
> First one UA is VoIP client on NOKIA N97. Client register to SIP 
> server with TLS successfully, but when make call from N97 to others I 
> got error code 477 Send failed (477/TM).
> I traced opensips, looks like opensips tried to forward the invite to 
> callee, but the tls socket failed to send the request.
> Logs from opensips here:
>
>     Feb  2 07:19:32 [5779] ERROR:core:tcp_send: failed to send
>     Feb  2 07:19:32 [5779] ERROR:tm:msg_send: tcp_send failed
>     Feb  2 07:19:32 [5779] ERROR:tm:t_forward_nonack: sending request
>     failed
>     Feb  2 07:19:32 [5779] DBG:tm:t_relay_to: t_forward_nonack
>     returned error
>     Feb  2 07:19:32 [5779] DBG:core:parse_headers: flags=ffffffffffffffff
>     Feb  2 07:19:32 [5779] DBG:core:check_via_address: params
>     10.57.52.186, 10.57.52.186, 0
>     Feb  2 07:19:32 [5779] DBG:tm:cleanup_uac_timers: RETR/FR timers reset
>     Feb  2 07:19:32 [5779] DBG:tm:set_timer: relative timeout is 30
>     Feb  2 07:19:32 [5779] DBG:tm:insert_timer_unsafe: [0]: 0xb61a180c
>     (92)
>     Feb  2 07:19:32 [5779] DBG:core:tcp_send: tcp connection found
>     (0xb61d7908), acquiring fd
>     Feb  2 07:19:32 [5779] DBG:core:tcp_send: c= 0xb61d7908, n=8
>     Feb  2 07:19:32 [5787] DBG:core:handle_ser_child: read response=
>     b61f4b48, 2, fd 41 from 16 (5779)
>     Feb  2 07:19:32 [5787] DBG:core:tcpconn_add: hashes: 719, 4
>     Feb  2 07:19:32 [5787] DBG:core:io_watch_add:
>     io_watch_add(0x817bbc0, 41, 2, 0xb61f4b48), fd_no=31
>     Feb  2 07:19:32 [5787] DBG:core:handle_ser_child: read response=
>     b61f4b48, -2, fd -1 from 16 (5779)
>     Feb  2 07:19:32 [5787] DBG:core:io_watch_del: io_watch_del
>     (0x817bbc0, 41, -1, 0x10) fd_no=32 called
>     Feb  2 07:19:32 [5787] DBG:core:tcpconn_destroy: destroying
>     connection 0xb61f4b48, flags 0002
>     Feb  2 07:19:32 [5787] DBG:core:tls_close: closing SSL connection
>     Feb  2 07:19:32 [5787] DBG:core:tls_update_fd: New fd is 41
>     Feb  2 07:19:32 [5787] DBG:core:tls_shutdown: shutdown successful
>     Feb  2 07:19:32 [5787] DBG:core:tls_tcpconn_clean: entered
>     Feb  2 07:19:32 [5787] DBG:core:handle_ser_child: read response=
>     b61d7908, 1, fd -1 from 16 (5779)
>     Feb  2 07:19:32 [5779] DBG:core:tcp_send: after receive_fd: c=
>     0xb61d7908 n=4 fd=34
>     Feb  2 07:19:32 [5779] DBG:core:tcp_send: sending...
>     Feb  2 07:19:32 [5779] DBG:core:tls_update_fd: New fd is 34
>     Feb  2 07:19:32 [5779] DBG:core:tls_write: write was successful
>     (374 bytes)
>     Feb  2 07:19:32 [5779] DBG:core:tcp_send: after write: c=
>     0xb61d7908 n=374 fd=34
>     Feb  2 07:19:32 [5779] DBG:core:tcp_send: buf=
>      
>
> Could some one help to have a look the problem?
>
>      
>
> Meanwhile, I use eyebeam 1.5 as client. Things more bad as the 
> register failed.
> I traced eyebeam and found the eyebeam failed when verify server's 
> certificate. Here I have something unclear about use the certificates 
> between client and server.
> To configure run opensips with TLS(just talk about the self-signed 
> case), we should create two certififcates. one is self-signed rootCA 
> (tls\rootCA\cacert.pem), another one is a certificate signed by rootCA 
> (tls\user\user-cert.pem).  The server hold rootCA by config 
> tls_ca_list and send certificate (by config tls_certificate) to client 
> when handshark with client.
> My question is how to config certificate in client side. In these two 
> cases (use N97 and eyebeam), I just imported the rootCA to my client.
> Is it right for config certificate on client? N97 seems OK with the 
> rootCA. But eyebeam failed. The guidline of eyebeam says:
>
>     During the TLS handshke, *the TLS server has to send to the client
>     the whole chain of certificate excepting the root certificate*;
>     the client must posses the root certificate otherwise the
>     authentication cannot happen.
>      
>
> Any idea to config opensips send 'the whole chain of certificate 
> excepting the root certificate' ?
>  
> Thanks for your kindly support.
> -- 
> Steven.W.Doolin
>  
> ------------------------------------------------------------------------
>
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>   


-- 
Bogdan-Andrei Iancu
www.voice-system.ro




More information about the Users mailing list