[SR-Users] RTP Engine early media issue one to many

2022-02-28 Thread Filippo Graziola
Hi everyone,
in my environment (kamailio - http API for retrieve destinations -
rtpengine) it is used a lot parallel forking, the flow is as follows:

A -> INVITE -> Kamailio -> http API/rtjson / t_relay -> Kamailio -> client
B / C / D (only one accepting the call)

Kamailio loops to itself to have a parallel forking, it involves rtpengine
correctly.
Both audio and video work during call.

The issue comes with one of destinations sending 183 with SDP, the caller
will send then a video preview as early media before call is established.
I noticed that only the first one "asking" for early media is receiving
this video preview (sometimes none of clients requesting it), all others
are ignored by caller.
This is a case of 1-to-many, I searched a lot about this but it seems at
least not working or not supported, could you confirm that there is no
configuration trick possible to make work this early media to many
destinations?
Another issue in above call flow, is that if client B is receiving
correctly this early media video and client C answers the call (200OK)
client C does not see any video, audio working and video is completely
missing from rtp, only a reinvite makes possible to see video. Is this a
client side only issue (so only solution is the reinvite) or there is
something missing on my kamailio configuration?

Thanks
Filippo
__
Kamailio - Users Mailing List - Non Commercial Discussions
  * sr-users@lists.kamailio.org
Important: keep the mailing list in the recipients, do not reply only to the 
sender!
Edit mailing list options or unsubscribe:
  * https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


Re: [SR-Users] reinvite with 2 video lines in SDP

2022-02-22 Thread Filippo Graziola
Hello,

thanks for replay. I will check how to make the script as per your
suggestion, many thanks for it.

Filippo

Il giorno lun 21 feb 2022 alle ore 16:15 Daniel-Constantin Mierla <
mico...@gmail.com> ha scritto:

> Hello,
>
> if you want to run kamailio development branch, then you should be able
> to do it with the body line iterator:
>
>   *
>
> https://www.kamailio.org/docs/modules/devel/modules/textopsx.html#textopsx.f.bl_iterator_start
>
> For stable branches at this moment I would run some inline
> Lua/Python/JavaScript/... script that builds the new body as wanted and
> then use KSR.textops.set_body(...) function.
>
> If you use rtpengine/rtpproxy, then you should also do msg_apply_changes().
>
> Cheers,
> Daniel
>
> On 21.02.22 15:55, Filippo Graziola wrote:
> > Hi all, I'm facing a strange behaviour from a client (iOS application
> > based on pjsip library) which is doing as follow when receiving a call
> > (on phone locked):
> > - accept the call rejecting video (m=video 0...) in SDP
> > - reinvite to negotiate again video media
> >
> > Specifically the reinvite passing through kamailio (+rtpengine) has
> > this SDP body after rtpengine offer (the client use TLS so I can't see
> > the original message):
> >
> > v=0
> > o=- 3854443139 3854443142 IN IP4 PUBLIC_RTP_ENGINE_IP
> > s=pjmedia
> > b=AS:386
> > t=0 0
> > a=X-nat:0
> > m=audio 46734 RTP/AVP 8 101
> > c=IN IP4 PUBLIC_RTP_ENGINE_IP
> > b=TIAS:96000
> > a=ssrc:1456418416 cname:441b90ac6db72f22
> > a=rtpmap:8 PCMA/8000
> > a=rtpmap:101 telephone-event/8000
> > a=fmtp:101 0-16
> > a=sendrecv
> > a=rtcp:46735
> > m=video 0 RTP/AVP 96
> > c=IN IP4 PUBLIC_RTP_ENGINE_IP
> > b=TIAS:256000
> > m=video 46776 RTP/AVP 98
> > c=IN IP4 PUBLIC_RTP_ENGINE_IP
> > b=TIAS:256000
> > a=rtpmap:98 H264/9
> > a=fmtp:98 profile-level-id=42e01e; packetization-mode=1
> > a=sendrecv
> > a=rtcp:46777
> >
> > from this I can understand that the client is doing something strange,
> > because there is still the rejection line (I know that this question
> > should go to the pjsip guys) but I would also like to know if it is
> > possible to "clean" this sdp by kamailio.
> > A few clients receiving this sdp are answering with only audio.
> > Reading the docs, sdpops/textops modules allow modifying lines by
> > prefix or media, but till now I have no luck to exclude only the line
> > "m=video 0 RTP/AVP 96" and his attributes without touching the correct
> > video request. Could someone please give me some hints on it?
> >
> > __
> > Kamailio - Users Mailing List - Non Commercial Discussions
> >   * sr-users@lists.kamailio.org
> > Important: keep the mailing list in the recipients, do not reply only to
> the sender!
> > Edit mailing list options or unsubscribe:
> >   * https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
>
> --
> Daniel-Constantin Mierla -- www.asipto.com
> www.twitter.com/miconda -- www.linkedin.com/in/miconda
> Kamailio Advanced Training - Online
>   Feb 21-24, 2022 (America Timezone)
>   * https://www.asipto.com/sw/kamailio-advanced-training-online/
>
>
__
Kamailio - Users Mailing List - Non Commercial Discussions
  * sr-users@lists.kamailio.org
Important: keep the mailing list in the recipients, do not reply only to the 
sender!
Edit mailing list options or unsubscribe:
  * https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


[SR-Users] reinvite with 2 video lines in SDP

2022-02-21 Thread Filippo Graziola
Hi all, I'm facing a strange behaviour from a client (iOS application based
on pjsip library) which is doing as follow when receiving a call (on phone
locked):
- accept the call rejecting video (m=video 0...) in SDP
- reinvite to negotiate again video media

Specifically the reinvite passing through kamailio (+rtpengine) has this
SDP body after rtpengine offer (the client use TLS so I can't see the
original message):

v=0
o=- 3854443139 3854443142 IN IP4 PUBLIC_RTP_ENGINE_IP
s=pjmedia
b=AS:386
t=0 0
a=X-nat:0
m=audio 46734 RTP/AVP 8 101
c=IN IP4 PUBLIC_RTP_ENGINE_IP
b=TIAS:96000
a=ssrc:1456418416 cname:441b90ac6db72f22
a=rtpmap:8 PCMA/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-16
a=sendrecv
a=rtcp:46735
m=video 0 RTP/AVP 96
c=IN IP4 PUBLIC_RTP_ENGINE_IP
b=TIAS:256000
m=video 46776 RTP/AVP 98
c=IN IP4 PUBLIC_RTP_ENGINE_IP
b=TIAS:256000
a=rtpmap:98 H264/9
a=fmtp:98 profile-level-id=42e01e; packetization-mode=1
a=sendrecv
a=rtcp:46777

from this I can understand that the client is doing something strange,
because there is still the rejection line (I know that this question should
go to the pjsip guys) but I would also like to know if it is possible to
"clean" this sdp by kamailio.
A few clients receiving this sdp are answering with only audio.
Reading the docs, sdpops/textops modules allow modifying lines by prefix or
media, but till now I have no luck to exclude only the line "m=video 0
RTP/AVP 96" and his attributes without touching the correct video request.
Could someone please give me some hints on it?
__
Kamailio - Users Mailing List - Non Commercial Discussions
  * sr-users@lists.kamailio.org
Important: keep the mailing list in the recipients, do not reply only to the 
sender!
Edit mailing list options or unsubscribe:
  * https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


Re: [SR-Users] serial forking kamailio - twilio

2021-07-21 Thread Filippo Graziola
Hi, thanks for answering. Based on your answer I was able to move the
call sequence to Twilio instead of handling in kamailio, now I send
the INVITE from kamailio to Twilio and in Twilio make a request to my
own API endpoint to create the call sequence and call logs.

thanks

Filippo



I think what you’re asking is: if a call is answered and hung up, can
Kamailio make another call to somewhere else?

If so, the answer is no; proxies just can’t do that. Forking deals
with the management early-stage requests during their pendency. Once a
final dispositive reply for a request is received from the upstream
UA, the transaction is finished. Kamailio cannot initiate new
transactions in that sense.

So, to roll over to another route after an answer+hangup, you’d need
to implement this on the calling UA side.

Is that an accurate understanding of your question?


Il giorno lun 19 lug 2021 alle ore 18:18 Filippo Graziola <
filippo.grazi...@gmail.com> ha scritto:

> Hi all,
>
> I have a question for my kamailio configuration which works like this:
>
> - INVITE arrives to kamailio
> - HTTP async request to API endpoint
> - Resume, use of rtjson module for parallel forking and loop to kamailio
> itself
> - One of the invite is "transformed" in serial forking with rtjson module
> and it is sent with a delay to TWILIO SIP Domain (landline/mobile phone
> numbers)
>
> Twilio is giving me some troubles because it answers with a 200 OK but the
> call it is still in establishing/ringing on the "landline" side and as
> expected when reaching the timeout (no answer from phone number on TWILIO
> side) kamailio is receiving a BYE.
>
> Now the question, how to handle next number to call through Twilio?
> I was thinking of using rtjson_next_route() when handling the in-dialog
> BYE but as it is not a failure route so it does not work, or I'm doing it
> wrong.
>
> Thanks in advance for any help/hint.
>
> Filippo
>
>
__
Kamailio - Users Mailing List - Non Commercial Discussions
  * sr-users@lists.kamailio.org
Important: keep the mailing list in the recipients, do not reply only to the 
sender!
Edit mailing list options or unsubscribe:
  * https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


[SR-Users] serial forking kamailio - twilio

2021-07-19 Thread Filippo Graziola
Hi all,

I have a question for my kamailio configuration which works like this:

- INVITE arrives to kamailio
- HTTP async request to API endpoint
- Resume, use of rtjson module for parallel forking and loop to kamailio
itself
- One of the invite is "transformed" in serial forking with rtjson module
and it is sent with a delay to TWILIO SIP Domain (landline/mobile phone
numbers)

Twilio is giving me some troubles because it answers with a 200 OK but the
call it is still in establishing/ringing on the "landline" side and as
expected when reaching the timeout (no answer from phone number on TWILIO
side) kamailio is receiving a BYE.

Now the question, how to handle next number to call through Twilio?
I was thinking of using rtjson_next_route() when handling the in-dialog BYE
but as it is not a failure route so it does not work, or I'm doing it wrong.

Thanks in advance for any help/hint.

Filippo
__
Kamailio - Users Mailing List - Non Commercial Discussions
  * sr-users@lists.kamailio.org
Important: keep the mailing list in the recipients, do not reply only to the 
sender!
Edit mailing list options or unsubscribe:
  * https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


Re: [SR-Users] kamailio 5.4.3 ubuntu 20.04 tls - http_async_client

2021-01-27 Thread Filippo Graziola
Hello,

here are the results for ssl packages (dpkg -l | grep ssl):

ii  libcrypt-openssl-bignum-perl 0.09-1build3
 amd64Perl module to access OpenSSL multiprecision integer
arithmetic libraries
ii  libcrypt-openssl-random-perl 0.15-1build2
 amd64module to access the OpenSSL pseudo-random number generator
ii  libcrypt-openssl-rsa-perl0.31-1build1
 amd64module for RSA encryption using OpenSSL
ii  libevent-openssl-2.1-7:amd64 2.1.11-stable-1
amd64Asynchronous event notification library (openssl)
ii  libgnutls-openssl27:amd643.6.13-2ubuntu1.3
amd64GNU TLS library - OpenSSL wrapper
ii  libssl-dev:amd64 1.1.1f-1ubuntu2.1
amd64Secure Sockets Layer toolkit - development files
ii  libssl1.1:amd64  1.1.1f-1ubuntu2.1
amd64Secure Sockets Layer toolkit - shared libraries
ii  libwavpack1:amd645.2.0-1ubuntu0.1
 amd64audio codec (lossy and lossless) - library
ii  libxmlsec1-openssl:amd64 1.2.28-2
 amd64Openssl engine for the XML security library
ii  libzstd1:amd64   1.4.4+dfsg-3
 amd64fast lossless compression algorithm
ii  openssl  1.1.1f-1ubuntu2.1
amd64Secure Sockets Layer toolkit - cryptographic utility
ii  perl-openssl-defaults:amd64  4
amd64version compatibility baseline for Perl OpenSSL packages
ii  python3-openssl  19.0.0-1build1
 all  Python 3 wrapper around the OpenSSL library
ii  ssl-cert 1.0.39
 all  simple debconf wrapper for OpenSSL

here is the result of ldd on tls.so:

 linux-vdso.so.1 (0x7ffd687d6000)
libssl.so.1.1 => /lib/x86_64-linux-gnu/libssl.so.1.1 (0x7f9feaf1c000)
libpthread.so.0 => /lib/x86_64-linux-gnu/libpthread.so.0
(0x7f9feaef9000)
libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x7f9fead07000)
libcrypto.so.1.1 => /lib/x86_64-linux-gnu/libcrypto.so.1.1
(0x7f9feaa31000)
/lib64/ld-linux-x86-64.so.2 (0x7f9feb071000)
libdl.so.2 => /lib/x86_64-linux-gnu/libdl.so.2 (0x7f9feaa2b000)

thanks
Filippo


Il giorno mer 27 gen 2021 alle ore 13:11 Daniel-Constantin Mierla <
mico...@gmail.com> ha scritto:

> Hello,
>
> can you give more details about libssl on Ubuntu 20.04? The version (apt
> show libssl, or apt search libssl, ...), eventually the ldd over the tls.so
> kamailio module.
>
> Cheers,
> Daniel
> On 26.01.21 16:10, Filippo Graziola wrote:
>
> Hello,
>
> thanks for the fast reply, I just tried kamailio (5.4.3) from kamailio
> repo on debian buster, self-signed certificates, same minimal
> configuration. No error on start, so it seems specific for ubuntu.
>
> Il giorno mar 26 gen 2021 alle ore 15:39 Daniel-Constantin Mierla <
> mico...@gmail.com> ha scritto:
>
>> Hello,
>>
>> would you be able to test on Debian 10 (maybe using docker or virtual
>> machine/virtualbox) and see if you get the same issue?
>>
>> I do not have Ubuntu 20.04 at hand and I haven't encountered any issue
>> lately with tls on Debian 10. In this way we can rule out if it is specific
>> to Ubuntu version of the libraries or not.
>>
>> Cheers,
>> Daniel
>> On 26.01.21 15:06, Filippo Graziola wrote:
>>
>> Hi all,
>> I have an issue related (my guess) to tls and http_async_client module
>> that result in a segmentation fault and a not correct handle of tls
>> connections.
>>
>> First with only tls module loaded, not forked:
>>
>>  0(1021) INFO:  [core/tcp_main.c:4983]: init_tcp(): using epoll_lt
>> as the io watch method (auto detected)
>>  0(1021) INFO: rr [../outbound/api.h:52]: ob_load_api(): unable to import
>> bind_ob - maybe module is not loaded
>>  0(1021) INFO: rr [rr_mod.c:185]: mod_init(): outbound module not
>> available
>>  0(1021) INFO: tls [tls_mod.c:389]: mod_init(): With ECDH-Support!
>>  0(1021) INFO: tls [tls_mod.c:392]: mod_init(): With Diffie Hellman
>>  0(1021) WARNING: tls [tls_init.c:784]: tls_h_mod_init_f(): openssl bug
>> #1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls
>> operations will fail preemptively) with free memory thresholds 4718592 and
>> 2359296 bytes
>>  0(1021) INFO:  [core/cfg/cfg_ctx.c:595]: cfg_set_now():
>> tls.low_mem_threshold1 has been changed to 4718592
>>  0(1021) INFO:  [core/cfg/cfg_ctx.c:595]: cfg_set_now():
>> tls.low_mem_threshold2 has been changed to 2359296
>>  0(1021) INFO:  [main.c:2833]: main(): processes (at least): 9 -
>> shm size: 67108864 - pkg size: 67108864
>>  0(1021) INFO:  [core/udp_server.c:154]:
>> probe_max_receive_buffer(): SO_RCVBUF is initially 212992
>&g

Re: [SR-Users] kamailio 5.4.3 ubuntu 20.04 tls - http_async_client

2021-01-26 Thread Filippo Graziola
Hello,

thanks for the fast reply, I just tried kamailio (5.4.3) from kamailio repo
on debian buster, self-signed certificates, same minimal configuration. No
error on start, so it seems specific for ubuntu.

Il giorno mar 26 gen 2021 alle ore 15:39 Daniel-Constantin Mierla <
mico...@gmail.com> ha scritto:

> Hello,
>
> would you be able to test on Debian 10 (maybe using docker or virtual
> machine/virtualbox) and see if you get the same issue?
>
> I do not have Ubuntu 20.04 at hand and I haven't encountered any issue
> lately with tls on Debian 10. In this way we can rule out if it is specific
> to Ubuntu version of the libraries or not.
>
> Cheers,
> Daniel
> On 26.01.21 15:06, Filippo Graziola wrote:
>
> Hi all,
> I have an issue related (my guess) to tls and http_async_client module
> that result in a segmentation fault and a not correct handle of tls
> connections.
>
> First with only tls module loaded, not forked:
>
>  0(1021) INFO:  [core/tcp_main.c:4983]: init_tcp(): using epoll_lt
> as the io watch method (auto detected)
>  0(1021) INFO: rr [../outbound/api.h:52]: ob_load_api(): unable to import
> bind_ob - maybe module is not loaded
>  0(1021) INFO: rr [rr_mod.c:185]: mod_init(): outbound module not available
>  0(1021) INFO: tls [tls_mod.c:389]: mod_init(): With ECDH-Support!
>  0(1021) INFO: tls [tls_mod.c:392]: mod_init(): With Diffie Hellman
>  0(1021) WARNING: tls [tls_init.c:784]: tls_h_mod_init_f(): openssl bug
> #1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls
> operations will fail preemptively) with free memory thresholds 4718592 and
> 2359296 bytes
>  0(1021) INFO:  [core/cfg/cfg_ctx.c:595]: cfg_set_now():
> tls.low_mem_threshold1 has been changed to 4718592
>  0(1021) INFO:  [core/cfg/cfg_ctx.c:595]: cfg_set_now():
> tls.low_mem_threshold2 has been changed to 2359296
>  0(1021) INFO:  [main.c:2833]: main(): processes (at least): 9 - shm
> size: 67108864 - pkg size: 67108864
>  0(1021) INFO:  [core/udp_server.c:154]: probe_max_receive_buffer():
> SO_RCVBUF is initially 212992
>  0(1021) INFO:  [core/udp_server.c:206]: probe_max_receive_buffer():
> SO_RCVBUF is finally 425984
>  0(1021) INFO: tls [tls_domain.c:305]: ksr_tls_fill_missing():
> TLSs: tls_method=12
>  0(1021) INFO: tls [tls_domain.c:317]: ksr_tls_fill_missing():
> TLSs: certificate='/etc/kamailio/fullchain.pem'
>  0(1021) INFO: tls [tls_domain.c:324]: ksr_tls_fill_missing():
> TLSs: ca_list='(null)'
>  0(1021) INFO: tls [tls_domain.c:331]: ksr_tls_fill_missing():
> TLSs: crl='(null)'
>  0(1021) INFO: tls [tls_domain.c:334]: ksr_tls_fill_missing():
> TLSs: require_certificate=0
>  0(1021) INFO: tls [tls_domain.c:342]: ksr_tls_fill_missing():
> TLSs: cipher_list='(null)'
>  0(1021) INFO: tls [tls_domain.c:349]: ksr_tls_fill_missing():
> TLSs: private_key='/etc/kamailio/privkey.pem'
>  0(1021) INFO: tls [tls_domain.c:352]: ksr_tls_fill_missing():
> TLSs: verify_certificate=0
>  0(1021) INFO: tls [tls_domain.c:356]: ksr_tls_fill_missing():
> TLSs: verify_depth=9
>  0(1021) INFO: tls [tls_domain.c:359]: ksr_tls_fill_missing():
> TLSs: verify_client=0
>  0(1021) NOTICE: tls [tls_domain.c:1105]: ksr_tls_fix_domain(): registered
> server_name callback handler for socket [:0], server_name='' ...
>  0(1021) INFO: tls [tls_domain.c:711]: set_verification(): TLSs:
> No client certificate required and no checks performed
>  0(1021) INFO: tls [tls_domain.c:305]: ksr_tls_fill_missing():
> TLSc: tls_method=20
>  0(1021) INFO: tls [tls_domain.c:317]: ksr_tls_fill_missing():
> TLSc: certificate='(null)'
>  0(1021) INFO: tls [tls_domain.c:324]: ksr_tls_fill_missing():
> TLSc: ca_list='(null)'
>  0(1021) INFO: tls [tls_domain.c:331]: ksr_tls_fill_missing():
> TLSc: crl='(null)'
>  0(1021) INFO: tls [tls_domain.c:334]: ksr_tls_fill_missing():
> TLSc: require_certificate=0
>  0(1021) INFO: tls [tls_domain.c:342]: ksr_tls_fill_missing():
> TLSc: cipher_list='(null)'
>  0(1021) INFO: tls [tls_domain.c:349]: ksr_tls_fill_missing():
> TLSc: private_key='(null)'
>  0(1021) INFO: tls [tls_domain.c:352]: ksr_tls_fill_missing():
> TLSc: verify_certificate=0
>  0(1021) INFO: tls [tls_domain.c:356]: ksr_tls_fill_missing():
> TLSc: verify_depth=9
>  0(1021) INFO: tls [tls_domain.c:359]: ksr_tls_fill_missing():
> TLSc: verify_client=0
>  0(1021) INFO: tls [tls_domain.c:714]: set_verification(): TLSc:
> Server MAY present invalid certificate
>  6(1027) ERROR: tls [tls_server.c:1283]: tls_h_read_f(): protocol level
> error
>  6(1027) ERROR: tls [tls_util.h:42]: tls_err_ret(): TLS
> accept:error:141FC044:SSL routines:tls_setup_handshake:internal error
>  6(1027) ERROR: tls [tls_server.c:1287]: tls_h_read_f(): source IP:
> XXX
>  6(1027)

[SR-Users] kamailio 5.4.3 ubuntu 20.04 tls - http_async_client

2021-01-26 Thread Filippo Graziola
Hi all,
I have an issue related (my guess) to tls and http_async_client module that
result in a segmentation fault and a not correct handle of tls connections.

First with only tls module loaded, not forked:

 0(1021) INFO:  [core/tcp_main.c:4983]: init_tcp(): using epoll_lt as
the io watch method (auto detected)
 0(1021) INFO: rr [../outbound/api.h:52]: ob_load_api(): unable to import
bind_ob - maybe module is not loaded
 0(1021) INFO: rr [rr_mod.c:185]: mod_init(): outbound module not available
 0(1021) INFO: tls [tls_mod.c:389]: mod_init(): With ECDH-Support!
 0(1021) INFO: tls [tls_mod.c:392]: mod_init(): With Diffie Hellman
 0(1021) WARNING: tls [tls_init.c:784]: tls_h_mod_init_f(): openssl bug
#1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls
operations will fail preemptively) with free memory thresholds 4718592 and
2359296 bytes
 0(1021) INFO:  [core/cfg/cfg_ctx.c:595]: cfg_set_now():
tls.low_mem_threshold1 has been changed to 4718592
 0(1021) INFO:  [core/cfg/cfg_ctx.c:595]: cfg_set_now():
tls.low_mem_threshold2 has been changed to 2359296
 0(1021) INFO:  [main.c:2833]: main(): processes (at least): 9 - shm
size: 67108864 - pkg size: 67108864
 0(1021) INFO:  [core/udp_server.c:154]: probe_max_receive_buffer():
SO_RCVBUF is initially 212992
 0(1021) INFO:  [core/udp_server.c:206]: probe_max_receive_buffer():
SO_RCVBUF is finally 425984
 0(1021) INFO: tls [tls_domain.c:305]: ksr_tls_fill_missing():
TLSs: tls_method=12
 0(1021) INFO: tls [tls_domain.c:317]: ksr_tls_fill_missing():
TLSs: certificate='/etc/kamailio/fullchain.pem'
 0(1021) INFO: tls [tls_domain.c:324]: ksr_tls_fill_missing():
TLSs: ca_list='(null)'
 0(1021) INFO: tls [tls_domain.c:331]: ksr_tls_fill_missing():
TLSs: crl='(null)'
 0(1021) INFO: tls [tls_domain.c:334]: ksr_tls_fill_missing():
TLSs: require_certificate=0
 0(1021) INFO: tls [tls_domain.c:342]: ksr_tls_fill_missing():
TLSs: cipher_list='(null)'
 0(1021) INFO: tls [tls_domain.c:349]: ksr_tls_fill_missing():
TLSs: private_key='/etc/kamailio/privkey.pem'
 0(1021) INFO: tls [tls_domain.c:352]: ksr_tls_fill_missing():
TLSs: verify_certificate=0
 0(1021) INFO: tls [tls_domain.c:356]: ksr_tls_fill_missing():
TLSs: verify_depth=9
 0(1021) INFO: tls [tls_domain.c:359]: ksr_tls_fill_missing():
TLSs: verify_client=0
 0(1021) NOTICE: tls [tls_domain.c:1105]: ksr_tls_fix_domain(): registered
server_name callback handler for socket [:0], server_name='' ...
 0(1021) INFO: tls [tls_domain.c:711]: set_verification(): TLSs:
No client certificate required and no checks performed
 0(1021) INFO: tls [tls_domain.c:305]: ksr_tls_fill_missing():
TLSc: tls_method=20
 0(1021) INFO: tls [tls_domain.c:317]: ksr_tls_fill_missing():
TLSc: certificate='(null)'
 0(1021) INFO: tls [tls_domain.c:324]: ksr_tls_fill_missing():
TLSc: ca_list='(null)'
 0(1021) INFO: tls [tls_domain.c:331]: ksr_tls_fill_missing():
TLSc: crl='(null)'
 0(1021) INFO: tls [tls_domain.c:334]: ksr_tls_fill_missing():
TLSc: require_certificate=0
 0(1021) INFO: tls [tls_domain.c:342]: ksr_tls_fill_missing():
TLSc: cipher_list='(null)'
 0(1021) INFO: tls [tls_domain.c:349]: ksr_tls_fill_missing():
TLSc: private_key='(null)'
 0(1021) INFO: tls [tls_domain.c:352]: ksr_tls_fill_missing():
TLSc: verify_certificate=0
 0(1021) INFO: tls [tls_domain.c:356]: ksr_tls_fill_missing():
TLSc: verify_depth=9
 0(1021) INFO: tls [tls_domain.c:359]: ksr_tls_fill_missing():
TLSc: verify_client=0
 0(1021) INFO: tls [tls_domain.c:714]: set_verification(): TLSc:
Server MAY present invalid certificate
 6(1027) ERROR: tls [tls_server.c:1283]: tls_h_read_f(): protocol level
error
 6(1027) ERROR: tls [tls_util.h:42]: tls_err_ret(): TLS
accept:error:141FC044:SSL routines:tls_setup_handshake:internal error
 6(1027) ERROR: tls [tls_server.c:1287]: tls_h_read_f(): source IP:
XXX
 6(1027) ERROR: tls [tls_server.c:1290]: tls_h_read_f(): destination IP:
XX
 6(1027) ERROR:  [core/tcp_read.c:1498]: tcp_read_req(): ERROR:
tcp_read_req: error reading - c: 0x7f2cbc1b3948 r: 0x7f2cbc1b3a70 (-1)

so no segmentation fault but error in handling.

Second one also with http_async_client loaded:

 0(1059) INFO:  [core/tcp_main.c:4983]: init_tcp(): using epoll_lt as
the io watch method (auto detected)
 0(1061) INFO: rr [../outbound/api.h:52]: ob_load_api(): unable to import
bind_ob - maybe module is not loaded
 0(1061) INFO: rr [rr_mod.c:185]: mod_init(): outbound module not available
 0(1061) INFO: tls [tls_mod.c:389]: mod_init(): With ECDH-Support!
 0(1061) INFO: tls [tls_mod.c:392]: mod_init(): With Diffie Hellman
 0(1061) INFO: http_async_client [http_async_client_mod.c:222]: mod_init():
Initializing Http Async module
 0(1061) WARNING: tls [tls_init.c:784]: tls_h_mod_init_f(): openssl bug
#1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls
operations will fail preemptively) with free memory thresholds 5242880 and
2621440 bytes
 0(1061) INFO:  [core/cfg/cfg_ctx.c:595]: cfg_set_now():
tls.low_mem_threshold1 has