Hi Hamid,

As the ERROR says, the SIP packet came into OpenSIPS in more than 4 chunks, making opensips to close the TCP connection (this is an action against potential TCP connect based attacks). For more see :
http://www.opensips.org/Documentation/Script-CoreParameters-1-11#toc96

(tcp_max_msg_chunks global param)

Regards,

Bogdan-Andrei Iancu
OpenSIPS Founder and Developer
http://www.opensips-solutions.com

On 16.02.2016 15:28, Hamid Hashmi wrote:
Now I am facing following ERROR. What can be the reason ?

|Feb 16 13:11:43 ec2-siplb SIPLB[30844]: NOTICE:proto_tls:verify_callback: depth = 2 Feb 16 13:11:43 ec2-siplb SIPLB[30844]: NOTICE:proto_tls:verify_callback: preverify is good: verify return: 1 Feb 16 13:11:43 ec2-siplb SIPLB[30844]: NOTICE:proto_tls:verify_callback: depth = 1 Feb 16 13:11:43 ec2-siplb SIPLB[30844]: NOTICE:proto_tls:verify_callback: preverify is good: verify return: 1 Feb 16 13:11:43 ec2-siplb SIPLB[30844]: NOTICE:proto_tls:verify_callback: depth = 0 Feb 16 13:11:43 ec2-siplb SIPLB[30844]: NOTICE:proto_tls:verify_callback: preverify is good: verify return: 1 Feb 16 13:11:43 ec2-siplb SIPLB[30844]: INFO:proto_tls:tls_accept: New TLS connection from 103.255.5.39:64219 accepted Feb 16 13:11:43 ec2-siplb SIPLB[30844]: INFO:proto_tls:tls_dump_cert_info: tls_accept: client TLS certificate subject: ******* Feb 16 13:11:43 ec2-siplb SIPLB[30844]: INFO:proto_tls:tls_dump_cert_info: tls_accept: local TLS server certificate subject: ******* Feb 16 13:11:43 ec2-siplb SIPLB[30844]: ERROR:proto_tls:tcp_handle_req: Made 4 read attempts but message is not complete yet - closing connection |

*/Hamid R. Hashmi/*
Software Engineer - VoIP
Vopium A/S


------------------------------------------------------------------------
Date: Fri, 12 Feb 2016 08:03:44 +0000
Subject: Re: [OpenSIPS-Users] How to TLS ?
From: [email protected]
To: [email protected]; [email protected]

Hi,

That option is only required if you want to enable "Mutual (two-way) client authentication' and is not normally necessary when using TLS. Most of these clients don't seem to support two way authentication. You can have this option disabled:
modparam("proto_tls","require_cert", "0").

477 error in my experience is usually a temporary connection error related to TLS, but not directly related to configuration.

Nabeel

On 12 Feb 2016 6:45 am, "Hamid Hashmi" <[email protected] <mailto:[email protected]>> wrote:

    Nabeel

    I dont know how to present a certificate from client. I have tried
    using Xoiper (Android - Free), SFLphone (Ubuntu) and CsipSimple
    (Android) but there was no options set a public key.

    Now I am using CA signed certificates in opensips with disabled
    flags of verify_cert and require_cert, having an error of *477
    Send failed (477/TM). *

    */Hamid R. Hashmi/*
    Software Engineer - VoIP
    Vopium A/S


    ------------------------------------------------------------------------
    Date: Tue, 9 Feb 2016 08:48:41 +0000
    From: [email protected] <mailto:[email protected]>
    To: [email protected] <mailto:[email protected]>
    Subject: Re: [OpenSIPS-Users] How to TLS ?

    Hi,

    Does the client present a client certificate? If not, then with
    modparam("proto_tls","require_cert", "1"), OpenSIPS misleadingly logs:
    'failed to accept: rejected by client'.  What it actually means is
    that the client failed to present a certificate.

    On 9 Feb 2016 6:06 am, "Hamid Hashmi" <[email protected]
    <mailto:[email protected]>> wrote:

        It will be a great help if you please help me in configuring
        TLS. I have followed this
        <http://www.opensips.org/Documentation/Tutorials-TLS-2-1> to
        configure TLS but could not able to verify certificates.

        its working if disable following flags

        modparam("proto_tls","verify_cert", "0")
        modparam("proto_tls","require_cert", "0")

        BUT not verifying certificates. Please see logs
        <http://pastebin.com/qmXZjSy2> if enabled

        modparam("proto_tls","verify_cert", "1")
        modparam("proto_tls","require_cert", "1")

        then have following ERROR

        |Feb 9 05:57:14 comoyo-dev-ec2-siplb SIPLB[29867]:
        [udp:[email protected]:8000
        <http://192.168.26.181:8000>]: Receive request OPTIONS from
        local server [192.168.26.181] Feb 9 05:57:14
        comoyo-dev-ec2-siplb SIPLB[29868]: ERROR:proto_tls:tls_accept:
        New TLS connection from 115.186.93.1:47015
        <http://115.186.93.1:47015> failed to accept: rejected by
        client Feb 9 05:57:14 comoyo-dev-ec2-siplb SIPLB[29868]:
        ERROR:proto_tls:tls_read_req: failed to do pre-tls reading Feb
        9 05:57:17 comoyo-dev-ec2-siplb SIPLB[29863]:
        [tcp:[email protected]:6080 <http://192.168.26.180:6080>]:
        In LOCAL Route sending OPTIONS to 192.168.26.181 Feb 9
        05:57:17 comoyo-dev-ec2-siplb SIPLB[29863]:
        INFO:core:probe_max_sock_buff: using snd buffer of 244 kb Feb
        9 05:57:17 comoyo-dev-ec2-siplb SIPLB[29863]:
        INFO:core:init_sock_keepalive: TCP keepalive enabled on socket
        17 |

        Regards
        */Hamid R. Hashmi/*


        _______________________________________________
        Users mailing list
        [email protected] <mailto:[email protected]>
        http://lists.opensips.org/cgi-bin/mailman/listinfo/users


    _______________________________________________ Users mailing list
    [email protected] <mailto:[email protected]>
    http://lists.opensips.org/cgi-bin/mailman/listinfo/users

    _______________________________________________
    Users mailing list
    [email protected] <mailto:[email protected]>
    http://lists.opensips.org/cgi-bin/mailman/listinfo/users



_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to