Hi Martin,

The relevant log is:

Feb 3 06:18:36 [3626] ERROR:core:tls_accept: New TLS connection from 123.12.28.14(my_ip):50761 failed to accept: rejected by client

So, the client opens a connection to OpenSIPS, OpenSIPS accepts the connection, but the connection setup fails as the client rejects the certificate sent by OpenSIPS.

Regards,

Bogdan-Andrei Iancu
OpenSIPS Founder and Developer
http://www.opensips-solutions.com

On 03.02.2015 05:24, martin-n martin-n wrote:

Hello. I'am pretty new with opensips, so installed the latest opensips version *opensips 2.1.1dev-tls (x86_64/linux), *to make a sip server.

I configured it to use tls. I generated the certificates according to this tutorial: https://github.com/antonraharja/book-opensips-101/blob/master/content/3.2.%20SIP%20TLS%20Secure%20Calling.mediawiki

Then i did setup the blink. I took *cacert.pem* from rootCA folder and set it up as a *Certificate Authority File. *In the account options i did setup the certificate file, *server-calist.pem*. I also did add the private key to the client version of *server-calist.pem* file.

But when i try to log-in to my server i get:

Feb 3 06:18:36 [3630] DBG:core:probe_max_sock_buff: getsockopt: snd is initially 425984 Feb 3 06:18:36 [3630] INFO:core:probe_max_sock_buff: using snd buffer of 416 kb Feb 3 06:18:36 [3630] INFO:core:init_sock_keepalive: -- TCP keepalive enabled on socket Feb 3 06:18:36 [3630] DBG:core:print_ip: tcpconn_new: new tcp connection to: 123.12.28.14(my_ip)
Feb  3 06:18:36 [3630] DBG:core:tcpconn_new: on port 50761, type 3
Feb 3 06:18:36 [3630] DBG:core:tls_tcpconn_init: entered: Creating a whole new ssl connection Feb 3 06:18:36 [3630] DBG:core:tls_tcpconn_init: looking up socket based TLS server domain [my_server_ip:7061] Feb 3 06:18:36 [3630] DBG:core:tls_find_server_domain: virtual TLS server domain not found, Using default TLS server domain settings Feb 3 06:18:36 [3630] DBG:core:tls_tcpconn_init: found socket based TLS server domain [0.0.0.0:0] Feb 3 06:18:36 [3630] DBG:core:tls_tcpconn_init: Setting in ACCEPT mode (server)
Feb  3 06:18:36 [3630] DBG:core:tcpconn_add: hashes: 795, 1
Feb 3 06:18:36 [3630] DBG:core:handle_new_connect: new connection: 0x7fb5b3e82170 25 flags: 0002 Feb 3 06:18:36 [3630] DBG:core:send2child: to tcp child 0 0(3626), 0x7fb5b3e82170 rw 1 Feb 3 06:18:36 [3626] DBG:core:handle_io: We have received conn 0x7fb5b3e82170 with rw 1 Feb 3 06:18:36 [3626] DBG:core:io_watch_add: [TCP_worker] io_watch_add op on 21 (0x89a400, 21, 8, 0x7fb5b3e82170,1), fd_no=2 Feb 3 06:18:36 [3626] DBG:core:tcp_read_req: Using the global ( per process ) buff
Feb  3 06:18:36 [3626] DBG:core:tls_update_fd: New fd is 21
Feb 3 06:18:36 [3626] ERROR:core:tls_accept: New TLS connection from 123.12.28.14(my_ip):50761 failed to accept: rejected by client Feb 3 06:18:36 [3626] DBG:core:io_watch_del: [TCP_worker] io_watch_del op on index 1 21 (0x89a400, 21, 1, 0x10,0x3) fd_no=3 called Feb 3 06:18:36 [3626] INFO:core:io_watch_del: [TCP_worker] size=3, fd array is 17 21 3 Feb 3 06:18:36 [3626] INFO:core:io_watch_del: [TCP_worker] size=3, prio array is 2 2 3 Feb 3 06:18:36 [3626] INFO:core:io_watch_del: [TCP_worker] size=2, fd array is 17 3 Feb 3 06:18:36 [3626] INFO:core:io_watch_del: [TCP_worker] size=3, prio array is 1 1 2 Feb 3 06:18:36 [3626] DBG:core:release_tcpconn: releasing con 0x7fb5b3e82170, state -2, fd=21, id=1 Feb 3 06:18:36 [3626] DBG:core:release_tcpconn: extra_data 0x7fb5b3e822f0 Feb 3 06:18:36 [3630] DBG:core:handle_tcp_child: reader response= 7fb5b3e82170, -2 from 0 Feb 3 06:18:36 [3630] DBG:core:tcpconn_destroy: destroying connection 0x7fb5b3e82170, flags 0002
Feb  3 06:18:36 [3630] DBG:core:tls_close: closing TLS connection
Feb  3 06:18:36 [3630] DBG:core:tls_update_fd: New fd is 25
Feb  3 06:18:36 [3630] DBG:core:tls_shutdown: shutdown successful
Feb  3 06:18:36 [3630] DBG:core:tls_tcpconn_clean: entered

My config looks like so:

auto_aliases=no


listen=udp:my_server_ip:7060   # CUSTOMIZE ME


disable_tcp=no


disable_tls=no
listen=tls:my_server_ip:7061   # CUSTOMIZE ME
tls_verify_server= 0
tls_verify_client = 1
tls_require_client_certificate = 1
#tls_method = TLSv1
tls_method = SSLv23
tls_certificate = "/usr/local/etc/opensips/tls/server/server-cert.pem"
tls_private_key = "/usr/local/etc/opensips/tls/server/server-privkey.pem"
tls_ca_list = "/usr/local/etc/opensips/tls/server/server-calist.pem"

Basically i want to verify if the client has right certificate. Can you help me?

Thanks.



_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to