[OpenSIPS-Users] Advice on TLS debugging

Fabian Gast fgast+opensips at only640k.net
Wed Mar 11 20:50:14 EST 2020


Hi, 
we do this on the application level with the siptrace [1] module:


loadmodule "proto_hep.so"
loadmodule "siptrace.so"
listen = hep_udp:127.0.0.1:60PRIMARYVIP
modparam("proto_hep", "hep_id", "[hep_dst] 127.0.0.1:50667; version=2")
modparam("siptrace", "trace_on", 0)
modparam("siptrace", "trace_id", "[tid]uri=hep:hep_dst")

################## MAIN ROUTING ######################
route {
    sip_trace("tid");



Now you can trace the unencrypted packets on 127.0.0.1:50667 via ngrep/tcpdump/... 

Maybe this helps you a little.

Fabian 


[1] https://opensips.org/html/docs/modules/2.4.x/siptrace


----- Ursprüngliche Mail -----
Von: "Mark Farmer" <farmorg at gmail.com>
An: "OpenSIPS users mailling list" <users at lists.opensips.org>
Gesendet: Mittwoch, 11. März 2020 17:48:06
Betreff: [OpenSIPS-Users] Advice on TLS debugging

Hi everyone 

I am trying to setup a SIP/TLS connection using OpenSIPS 2.4 and I am struggling to find a good way to examine SIP messages/responses due to them being encrypted. 
Normally I just sngrep but using the -k arg doesn't seem to be working. 

How do others deal with this? 

Many thanks 
Mark. 


_______________________________________________ 
Users mailing list 
Users at lists.opensips.org 
http://lists.opensips.org/cgi-bin/mailman/listinfo/users 




More information about the Users mailing list