We can decode the wireshark traces by loading the serverkey.pem of proxy and
sip server in wireshark ->edit->prefrences->ssl.
format is like below.
21.21.27.210,5061,sip,C:\serverkey.pem;41.41.0.230,5061,sip,C:\serverkey.pem;
The important point is,
1. The wireshark traces needs to be collected fr
Really strange. btw: how do you manage to decode the SSL payload in
Wireshark?
regards
klaus
Jijo Jose schrieb:
Hi Klaus,
Sorry for sending the screenshot..
In the 2nd record, i see 2 CRLF at the end of sip message.
I'm using openser 1.1, I just verified kamailio 1.4 to see any changes
Hi Klaus,
Sorry for sending the screenshot..
In the 2nd record, i see 2 CRLF at the end of sip message.
I'm using openser 1.1, I just verified kamailio 1.4 to see any changes in
the TLS module. The code base for TLS in openser 1.1 and kamailio 1.4 is
same.
Thanks
Jijo
On Mon, Jan 25, 2010 at 3
Hi Jijo!
- Next time, please do not send a screenshot, but the pcap file (if it
would contain private data, send it privately)
- the screenshot shows the first message, but more interesting is the
second message
- which version of Kamailio do you use (kamailio -V)? You mentioned that
you c