Maybe you should first take a look at https://blog.opensips.org/2020/01/23/shaken-not-stirred/ and https://opensips.org/docs/modules/3.1.x/stir_shaken.html

Regards,

Bogdan-Andrei Iancu

OpenSIPS Founder and Developer
  https://www.opensips-solutions.com
OpenSIPS Summit, Amsterdam, May 2020
  https://www.opensips.org/events/Summit-2020Amsterdam/

On 4/13/20 6:58 PM, Saint Michael wrote:
I see, so I need to update my Opensips to 3.1, and then how does it work? the module grabs my certificate and generates the signature? Is there a command line tool that can do that meanwhile? We can always add the signature like any other header.
Can somebody paste a sample code here so I my try?




On Mon, Apr 13, 2020 at 11:34 AM Vlad Patrascu <[email protected] <mailto:[email protected]>> wrote:

    Hi Frederico,

    I'm not really sure I understand your question of "how" to
    generate the signature. Are you refering to how the scripting
    should look like or something else ? But anyway, it is not
    possible with OpenSIPS 2.4.7 as the stir_shaken module is
    available starting with OpenSIPS 3.1.

    Regards,

    Vlad Patrascu

    On 13.04.2020 18:13, Saint Michael wrote:
    I am trying to do the same. The question I need to ask here is:
    how do you generate the signature from the certificate, the
    caller ID and the destination number?
    I have the API working in staging mode, but now I need to really
    sign a call and send it forward with Opensips 2.4.7

    Federico

    On Mon, Apr 13, 2020 at 11:03 AM Vlad Patrascu
    <[email protected] <mailto:[email protected]>> wrote:

        Hi Alexandru,

        OpenSIPS is using the signature in DER encoded format (as it
        is directly generated by openssl) but indeed it is not the
        proper format as per RFC 7518. Thanks for the report, I am
        working on a fix.

        Regards,

        Vlad Patrascu

        On 10.04.2020 12:28, Alexandru Tripon wrote:
        Hi,

        I tried to populate the Identity header with the stir_shaken
        module.
        The header is populated but when I try to verify the
        signature using an external tool it fails because of the length.
        I have the folowing Identity generated by Opensips:
        `
        
eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiL2hvbWUvdHJpYWwvTHVjcnUvQ29kZS9zdGlyU2hha2VuL215cHVia2V5LnBlbSJ9.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODY1MDMxODcsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.MEYCIQCjIx6w8IeilqHq0jbc6uwIB9v1RDmecoep0gRJJC4EmQIhANH1MO9jwRtqH6jgFH12XqROFv-nUroEgzsRAaMJtAsR;info=\u003c/home/trial/Lucru/Code/stirShaken/mypubkey.pem\u003e;ppt=\"shaken\"
        `
        the lenght of encoded signature(in base64) is 96 and in the
        decoded one is 72.
        In the RFC for ES256
        algorithm(https://tools.ietf.org/html/rfc7518#section-3.4)
        the length of the decoded signature is 64.
        Am I missing something here?

        Thanks,
        Alexandru Tripon

        _______________________________________________
        Users mailing list
        [email protected]  <mailto:[email protected]>
        http://lists.opensips.org/cgi-bin/mailman/listinfo/users
        _______________________________________________
        Users mailing list
        [email protected] <mailto:[email protected]>
        http://lists.opensips.org/cgi-bin/mailman/listinfo/users


    _______________________________________________
    Users mailing list
    [email protected]  <mailto:[email protected]>
    http://lists.opensips.org/cgi-bin/mailman/listinfo/users
    _______________________________________________
    Users mailing list
    [email protected] <mailto:[email protected]>
    http://lists.opensips.org/cgi-bin/mailman/listinfo/users


_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to