Hi Damien,
IMHO, in most of the cases, the subscription is generated by the party
interested to receive the notifications, so the contact in SUBSCRIBE
will match the source address of the SUBSCRIBE requests.
To be honest, I never came across a kind of third-party subscription
scenario.
Anyhow, your comment is fully correct, I do thank you for the reminder
on looking into the connection reusage cases.
Regards,
Bogdan-Andrei Iancu
OpenSIPS Founder and Developer
http://www.opensips-solutions.com
On 31.08.2015 12:29, Damien Sandras wrote:
Hi Bogdan,
I'm not sure about that (see our previous discussions about connection
reuse).
It will only reuse the active SUBSCRIBE TCP connection if the Contact
header of the SUBSCRIBE indicates the same IP/port than the one used
to create the outbound SUBSCRIBE TCP connection. That is rarely the case.
Or am I missing something ?
Le lundi 31 août 2015 à 12:17 +0300, Bogdan-Andrei Iancu a écrit :
Hi Bogdan,
If the conn with B is still alive (the one created by SUBSCRIBE
requests), it should be reused when OpenSIPS has to send the NOTIFY.
Have you enabled the tcp aliases ?
If still a problem, can you make a log (with debug 6) when the NOTIFY
is to be send + a listing from list_tcp_conns ?
Regards,
Bogdan-Andrei Iancu
OpenSIPS Founder and Developer
http://www.opensips-solutions.com
On 28.08.2015 20:53, Bogdan Chifor wrote:
Hello,
I have a question regarding the following scenario:
1. I have two devices connected to the server via two-way TLS(TCP).
1.1 Device A is behind a NAT
1.2 Device B is directly connected to the server
2. Device B subscribes to the presence of device A.
3. Device A gets offline and the server generates a NOTIFY message
to be sent to device B.
4. The server does not find an existing tcp connection (from the
logs), even though the socket is visible if the "opensipsctl fifo
list_tcp_conns" or "netstat" commands are used.
5. Because the server does not find an existing connection it
initiates one (TLS). After that the proto tls module logs the
following error: "NOTICE:proto_tls:verify_callback: verify
error:num=26:unsupported certificate purpose".
6. This error is normal because device B does not have a certificate
with server authentication extended key usage, it has only the
client authentication extended key usage (as normal).
What is the reason behind the start of the new connection and how
should I handle this issue?
This is my proto_tls config:
*modparam("proto_tls", "verify_cert", "1")*
*modparam("proto_tls", "require_cert", "1")*
*modparam("proto_tls", "tls_method", "TLSv1")*
*modparam("proto_tls", "certificate", "...")*
*modparam("proto_tls", "private_key", "...")*
*modparam("proto_tls", "ca_list", "...")*
*modparam("proto_tls", "ca_dir", "...")*
Any help is appreciated.
Best regards,
Bogdan.
_______________________________________________
Users mailing list
[email protected] <mailto:[email protected]>
http://lists.opensips.org/cgi-bin/mailman/listinfo/users
_______________________________________________
Users mailing list
[email protected] <mailto:[email protected]>
http://lists.opensips.org/cgi-bin/mailman/listinfo/users
--
Damien SANDRAS
*Ekiga Project*
http://www.ekiga.org
_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users
_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users