[OpenSIPS-Users] Control TLS client domain

Bogdan-Andrei Iancu bogdan at opensips.org
Thu Mar 28 11:45:32 EDT 2019


Hi Alexey,

oh, if it is MS related, I don't wanna hear about it :P.....Just joking 
- please open a bug report on the tracker.

Regards,

Bogdan-Andrei Iancu

OpenSIPS Founder and Developer
   https://www.opensips-solutions.com
OpenSIPS Summit 2019
   https://www.opensips.org/events/Summit-2019Amsterdam/

On 03/28/2019 03:16 PM, Alexey Vasilyev wrote:
> Hi Bogdan,
>
> Yes, of course this is real scenario. MS Teams integration. They 
> authenticate everything by TLS certificates used by connection. It 
> works fine for 1 integration.
> But if I send SIP with domain2 to the TLS connection encrypted with 
> certificate for domain1, I just fail.
> And actually everybody I checked reusing TLS sessions almost the same 
> way as TCP. So OpenSIPS will be the first doing this correct way.
> And I like comments from tls_mgm.c
> /* what if we have multiple connections to the same remote socket? 
> e.g. we can have
> connection 1: localIP1:localPort1 <--> remoteIP:remotePort
> connection 2: localIP2:localPort2 <--> remoteIP:remotePort
> but I think the is very unrealistic */
> So I got exactly this scenario.
>
>
> чт, 28 мар. 2019 г. в 13:47, Bogdan-Andrei Iancu <bogdan at opensips.org 
> <mailto:bogdan at opensips.org>>:
>
>     Hi Alexey,
>
>     It make sense (logically speaking) to get the TLS domain involved
>     in the
>     TCP conn re-usage alg - but my question is: have you came across a
>     real
>     scenario with such a need ?
>
>     Regards,
>
>     Bogdan-Andrei Iancu
>
>     OpenSIPS Founder and Developer
>     https://www.opensips-solutions.com
>     OpenSIPS Summit 2019
>     https://www.opensips.org/events/Summit-2019Amsterdam/
>
>     On 03/26/2019 02:23 PM, vasilevalex wrote:
>     > Hi Bogdan,
>     >
>     > Thanks for fix!
>     >
>     > What do you think about reusing TLS connections? In master
>     branch this
>     > behavior still the same. OpenSIPS reuses TLS connections the
>     same way as
>     > regular TCP connections, but it should not. For reusing TCP
>     connection we
>     > check, if connection with the same dst IP:PORT exists. But for
>     TLS it is not
>     > enough. We additionally should check, what certificate uses this
>     connection
>     > (or what domain it is related).
>     >
>     > And in documentation for tls_mgm module everywhere written:
>     Note: If there
>     > is already an existing TLS connection to the remote target, it
>     will be
>     > reused and setting this AVP has no effect.
>     >
>     > This is the same case - we have only 1 destination target, but
>     we should use
>     > several TLS connections to this target with different TLS
>     certificates. So
>     > first connection will be successful, but SIP message for second
>     domain which
>     > should use another certificate will try to reuse this first
>     connection, as
>     > target is the same. And this message will fail.
>     >
>     >
>     >
>     > -----
>     > ---
>     > Alexey Vasilyev
>     > --
>     > Sent from:
>     http://opensips-open-sip-server.1449251.n2.nabble.com/OpenSIPS-Users-f1449235.html
>     >
>     > _______________________________________________
>     > Users mailing list
>     > Users at lists.opensips.org <mailto:Users at lists.opensips.org>
>     > http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>
>
>
> -- 
> Best regards
> Alexey Vasilyev

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/users/attachments/20190328/ae46dc28/attachment.html>


More information about the Users mailing list