Re: [SR-Users] Websocket with kamailio IMS

2016-10-13 Thread Daniel-Constantin Mierla
Hello,

I see:

WARNING: no fork mode

That means you have fork=no and that is not going to work with tcp/tls
and more than one listen socket. Try with fork=yes.

Cheers,
Daniel

On 13/10/16 20:52, Serhat Guler wrote:
> Dear all,
>
> I am trying to configure websockets for kamailio IMS. My basic
> kamailio(without IMS) setup works properly with websockets and without
> websockets. The IMS functionality also works, but only with IMS
> clients and now I want to use webrtc clients and make calls. At the
> moment I am trying to add the websockets support to the pcscf. I have
> did some changes to the pcscf cfg file. 
>
> My problem is not really related to the cfg of pcscf as the component
> is listening for tcp/tls connections, but I cannot connect through the
> assigned ports. The output of the pcscf component and the the
> wireshark pcap file for the Websocket are attached. (I basically tried
> to browse http://server.ip.address:tcp.port
> or https://server.ip:tls.port without using a webrtc client yet).
>
> 192.168.0.10 -> host
> 192.168.0.11 -> virtual machine running kamailio
>
> Thanks in advance,
> Serhat
>
>
>
> ___
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users@lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

-- 
Daniel-Constantin Mierla
http://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Kamailio Advanced Training, Berlin, Oct 24-26, 2016 - http://www.asipto.com

___
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users


[SR-Users] Websocket with kamailio IMS

2016-10-13 Thread Serhat Guler
Dear all,

I am trying to configure websockets for kamailio IMS. My basic
kamailio(without IMS) setup works properly with websockets and without
websockets. The IMS functionality also works, but only with IMS clients and
now I want to use webrtc clients and make calls. At the moment I am trying
to add the websockets support to the pcscf. I have did some changes to the
pcscf cfg file.

My problem is not really related to the cfg of pcscf as the component is
listening for tcp/tls connections, but I cannot connect through the
assigned ports. The output of the pcscf component and the the wireshark
pcap file for the Websocket are attached. (I basically tried to browse
http://server.ip.address:tcp.port or https://server.ip:tls.port without
using a webrtc client yet).

192.168.0.10 -> host
192.168.0.11 -> virtual machine running kamailio

Thanks in advance,
Serhat
Listening on
 udp: server.net1.test [192.168.0.11]:4060
 tcp: 192.168.0.11 [192.168.0.11]:880
 tcp: server.net1.test [192.168.0.11]:4060
 tls: 192.168.0.11 [192.168.0.11]:4443
 tls: server.net1.test [192.168.0.11]:5061
Aliases:
 *: pcscf.net1.test:*

WARNING: no fork mode
 0(1537) INFO:  [tcp_main.c:4665]: init_tcp(): using epoll_lt as the io 
watch method (auto detected)
 0(1537) INFO: rr [../outbound/api.h:54]: ob_load_api(): unable to import 
bind_ob - maybe module is not loaded
 0(1537) INFO: rr [rr_mod.c:174]: mod_init(): outbound module not available
 0(1537) INFO: ims_usrloc_pcscf [hslot.c:62]: ul_init_locks(): locks array size 
512
 0(1537) INFO: tls [tls_mod.c:362]: mod_init(): With ECDH-Support!
 0(1537) INFO: tls [tls_mod.c:365]: mod_init(): With Diffie Hellman
 0(1537) INFO: tls [tls_init.c:593]: init_tls_h(): tls: _init_tls_h:  compiled  
with  openssl  version "OpenSSL 1.0.1t  3 May 2016" (0x1000114f), kerberos 
support: off, compression: on
 0(1537) INFO: tls [tls_init.c:601]: init_tls_h(): tls: init_tls_h: installed 
openssl library version "OpenSSL 1.0.1t  3 May 2016" (0x1000114f), kerberos 
support: off,  zlib compression: off
 compiler: gcc -I. -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 
-fstack-protector-strong -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 
-Wl,-z,relro -Wa,--noexecstack -Wall -march=i686 -DOPENSSL_BN_ASM_PART_WORDS 
-DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM 
-DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM 
-DWHIRLPOOL_ASM -DGHASH_ASM
 0(1537) WARNING: tls [tls_init.c:655]: init_tls_h(): tls: openssl bug #1491 
(crash/mem leaks on low memory) workaround enabled (on low memory tls 
operations will fail preemptively) with free memory thresholds 8388608 and 
4194304 bytes
 0(1537) INFO:  [cfg/cfg_ctx.c:608]: cfg_set_now(): INFO: cfg_set_now(): 
tls.low_mem_threshold1 has been changed to 8388608
 0(1537) INFO:  [cfg/cfg_ctx.c:608]: cfg_set_now(): INFO: cfg_set_now(): 
tls.low_mem_threshold2 has been changed to 4194304
 0(1537) INFO:  [udp_server.c:150]: probe_max_receive_buffer(): SO_RCVBUF 
is initially 163840
 0(1537) INFO:  [udp_server.c:200]: probe_max_receive_buffer(): SO_RCVBUF 
is finally 327680
 0(1537) INFO: tls [tls_domain.c:276]: fill_missing(): TLSs: 
tls_method=3
 0(1537) INFO: tls [tls_domain.c:288]: fill_missing(): TLSs: 
certificate='/usr/local/etc/kamailio/kamailio-selfsigned.pem'
 0(1537) INFO: tls [tls_domain.c:295]: fill_missing(): TLSs: 
ca_list='/usr/local/src/kamailio-4.3/kamailio/etc/tls/rootCA/cacert.pem'
 0(1537) INFO: tls [tls_domain.c:302]: fill_missing(): TLSs: 
crl='(null)'
 0(1537) INFO: tls [tls_domain.c:306]: fill_missing(): TLSs: 
require_certificate=0
 0(1537) INFO: tls [tls_domain.c:313]: fill_missing(): TLSs: 
cipher_list='(null)'
 0(1537) INFO: tls [tls_domain.c:320]: fill_missing(): TLSs: 
private_key='/usr/local/etc/kamailio/kamailio-selfsigned.key'
 0(1537) INFO: tls [tls_domain.c:324]: fill_missing(): TLSs: 
verify_certificate=0
 0(1537) INFO: tls [tls_domain.c:327]: fill_missing(): TLSs: 
verify_depth=9
 0(1537) INFO: tls [tls_domain.c:671]: set_verification(): TLSs: No 
client certificate required and no checks performed
 0(1537) INFO: tls [tls_domain.c:276]: fill_missing(): TLSc: 
tls_method=12
 0(1537) INFO: tls [tls_domain.c:288]: fill_missing(): TLSc: 
certificate='(null)'
 0(1537) INFO: tls [tls_domain.c:295]: fill_missing(): TLSc: 
ca_list='(null)'
 0(1537) INFO: tls [tls_domain.c:302]: fill_missing(): TLSc: 
crl='(null)'
 0(1537) INFO: tls [tls_domain.c:306]: fill_missing(): TLSc: 
require_certificate=1
 0(1537) INFO: tls [tls_domain.c:313]: fill_missing(): TLSc: 
cipher_list='(null)'
 0(1537) INFO: tls [tls_domain.c:320]: fill_missing(): TLSc: 
private_key='(null)'
 0(1537) INFO: tls [tls_domain.c:324]: fill_missing(): TLSc: 
verify_certificate=1
 0(1537) INFO: tls [tls_domain.c:327]: fill_missing(): TLSc: 
verify_depth=9
 0(1537) INFO: tls