Hi, We are using Sofia SIP 1.12.11 as UA with Asterisk 1.8.7 using TLS. It registers OK but then keeps losing its connection and seems to keep registering every 30 seconds.
We have tried other clients such as Bria and these work fine with TLS to our Asterisk 1.8.7 server so its something to do with our Sofia client. The Sofia client works fine with TCP with same Asterisk 1.8.7 server. Trace is below, Sofia seems to get a HUP event which makes it lose its connection, anybody any ideas how to make Sofia keep the TLS connection open THanks ------------------------------------------------------------------------- nua: nua_stack_init: entering nua: nua_stack_set_params: entering nta_agent_create: initialized hash tables nta_agent_create: initialized transports nta_agent_create: initialized random identifiers nta_agent_create: initialized timer tport_tls_writevec: vec 0x4676c80 0xb6f200 581 (581) tport_vsend returned 581 tport(0x4687d80): reset timer nta: sent SUBSCRIBE (18216628) to TLS/178.76.132.10:5061 tport_pend(0x4687d80): pending 0x4665030 for tls/178.76.132.10:5061 (already 0) nua(0x4673cd0): removing subscribe usage with event message-summary nta_leg_destroy(0x468bc80) nta_leg_destroy(0x0) nua: nua_stack_shutdown: entering nta: outgoing_free(0x4664520) tport_release(0x4687d80): 0x4665030 by 0x4664520 with 0x0 tport(0x4687d80): set timer at 1799987 ms because idle since send sres_sofia_update(0x7998a0, -1, -1) sres_sofia_update(0x0, -1, -1) tport_destroy(0x4688af0) nta_agent_create: initialized resolver tport_create(): 0x465eb10 nta: master transport created tport_bind_server(0x465eb10) to */192.168.1.100:10131/sips tport_bind_server(0x465eb10): calling tport_listen for tls tport_alloc_primary(0x465eb10): new primary tport 0x465af70 tport_tls_init_master(0x465af70): tls context initialized for 192.168.1.100 tport_listen(0x465af70): listening at tls/192.168.1.100:10131/sips nta: bound to (192.168.1.100:10131;transport=*) nta: agent_init_via: SIP/2.0/tls 192.168.1.100:10131 (sips) nta: Via fields initialized nta: Contact header created nua_register: Adding contact URL '192.168.1.100' to list. nua: nua_set_params: entering nua(0x0): sent signal r_set_params nua: nh_create_handle: entering nua: nua_set_hparams: entering nua(0x7b5040): sent signal r_set_params nua: nh_create_handle: entering nua: nua_set_hparams: entering nua(0x46937b0): sent signal r_set_params nua: nua_register: entering nua(0x7b5040): sent signal r_register nua: nua_subscribe: entering nua(0x46937b0): sent signal r_subscribe nua: nua_application_event: entering nua: nua_destroy: entering nua: nua_stack_deinit: entering su_kqueue_port_deinit(0x4666c90) called nua: nua_stack_set_params: entering nua: nua_stack_set_params: entering nua: nua_stack_set_params: entering nua: nua_stack_set_params: entering nua(0x7b5040): adding register usage nta_leg_tcreate(0x4687030) nta: selecting scheme sips tport_tsend(0x465af70) tpn = tls/178.76.132.10:5061 tport_resolve addrinfo = 178.76.132.10:5061 tport_by_addrinfo(0x465af70): not found by name tls/178.76.132.10:5061 tport_alloc_secondary(0x465af70): new secondary tport 0x7dea60 tport_tls_connect(0x7dea60): connecting to tls/178.76.132.10:5061/sips tport(0x7dea60): reset timer tport_queue(0x7dea60): queueing 0x46930c0 for tls/178.76.132.10:5061 nta: sent REGISTER (18216632) to tls/178.76.132.10:5061 tport_pend(0x7dea60): pending 0x46930c0 for tls/178.76.132.10:5061 (already 0) nta: timer set to 32000 ms nua: nua_stack_set_params: entering nua(0x46937b0): adding subscribe usage with event message-summary nta_leg_tcreate(0x7e62e0) nta: selecting scheme sip tport_tsend(0x465af70) tpn = */178.76.132.10:5061 tport_resolve addrinfo = 178.76.132.10:5061 tport_by_addrinfo(0x465af70): found 0x7dea60 by name */178.76.132.10:5061 tport_queue(0x7dea60): queueing 0x4694db0 for tls/178.76.132.10:5061 nta: sent SUBSCRIBE (18216632) to */178.76.132.10:5061 tport_pend(0x7dea60): pending 0x4694db0 for tls/178.76.132.10:5061 (already 1) tls_connect(0x7dea60): events CONNECTING nua: nua_application_event: entering nua: nua_application_event: entering nua: nua_application_event: entering tls_connect(0x7dea60): events NEGOTIATING tls_connect(0x7dea60): events NEGOTIATING tport_send_event(0x7dea60) - ready to send to (tls/178.76.132.10:5061) tport_tls_writevec: vec 0x465ba60 0xb5ca00 485 (485) tport_vsend returned 485 tport_tls_writevec: vec 0x465ba60 0xb71200 545 (545) tport_vsend returned 545 tport_tls_set_events(0x7dea60): logical events IN real IN tport(0x7dea60): reset timer tport_wakeup(0x7dea60): events IN tport_recv_event(0x7dea60) tport_tls_recv(0x7dea60): tls_read() returned 527 tport_recv_iovec(0x7dea60) msg 0x4662050 from (tls/178.76.132.10:5061) has 527 bytes, veclen = 1 tport_deliver(0x7dea60): msg 0x4662050 (527 bytes) from tls/178.76.132.10:5061/sips next=0x0 nta: received 401 Unauthorized for REGISTER (18216632) nta: 401 Unauthorized is going to a transaction nta_outgoing: RTT is 272.915 ms tport_release(0x7dea60): 0x46930c0 by 0x4693d10 with 0x4662050 outbound(0x7b5040): detected NAT: 192.168.1.100 != 92.28.64.198 auth_digest_challenge_get(): got 4 nta: outgoing_free(0x4693d10) tport(0x7dea60): reset timer tport_wakeup(0x7dea60): events IN tport_recv_event(0x7dea60) tport_tls_recv(0x7dea60): tls_read() returned 528 tport_recv_iovec(0x7dea60) msg 0x46930c0 from (tls/178.76.132.10:5061) has 528 bytes, veclen = 1 tport_deliver(0x7dea60): msg 0x46930c0 (528 bytes) from tls/178.76.132.10:5061/sips next=0x0 nta: received 401 Unauthorized for SUBSCRIBE (18216632) nta: 401 Unauthorized is going to a transaction nta_outgoing: RTT is 276.353 ms tport_release(0x7dea60): 0x4694db0 by 0x4695450 with 0x46930c0 auth_digest_challenge_get(): got 4 nta: outgoing_free(0x4695450) tport(0x7dea60): reset timer tport(0x7dea60): set timer at 1799999 ms because idle since recv nua: nua_application_event: entering nua: nua_application_event: entering nua: nua_authenticate: entering nua(0x7b5040): sent signal r_authenticate nua: nua_application_event: entering nua: nua_authenticate: entering nua(0x46937b0): sent signal r_authenticate auth_digest_a1() has A1 = MD5(2000:asterisk:1234) = 3ef464e089ec15ab06967d09b2fa0c63 A2 = MD5(REGISTER:sips:178.76.132.10) auth_response: 1086fee7745e39171c8186211f955193 = MD5(3ef464e089ec15ab06967d09b2fa0c63:07997db9:22a2be38885d846b002befc573cf091e) (qop=NONE) nta: selecting scheme sips tport_tsend(0x465af70) tpn = tls/178.76.132.10:5061 tport_resolve addrinfo = 178.76.132.10:5061 tport_by_addrinfo(0x465af70): found 0x7dea60 by name tls/178.76.132.10:5061 tport_tls_writevec: vec 0x465ba60 0xb5ca00 644 (644) tport_vsend returned 644 tport(0x7dea60): set timer at 1799993 ms because idle since send nta: sent REGISTER (18216633) to tls/178.76.132.10:5061 tport_pend(0x7dea60): pending 0x46930c0 for tls/178.76.132.10:5061 (already 0) auth_digest_a1() has A1 = MD5(2000:asterisk:1234) = 3ef464e089ec15ab06967d09b2fa0c63 A2 = MD5(SUBSCRIBE:sip:2000@178.76.132.10) auth_response: 96a3063224c87f5c987a63fcdaee8087 = MD5(3ef464e089ec15ab06967d09b2fa0c63:213b8647:ce8d60dff9c29877f260c47204b89ce2) (qop=NONE) nta: selecting scheme sip tport_tsend(0x465af70) tpn = */178.76.132.10:5061 tport_resolve addrinfo = 178.76.132.10:5061 tport_by_addrinfo(0x465af70): found 0x7dea60 by name */178.76.132.10:5061 tport_tls_writevec: vec 0x465ba60 0xb6c600 710 (710) tport_vsend returned 710 tport(0x7dea60): reset timer nta: sent SUBSCRIBE (18216633) to */178.76.132.10:5061 tport_pend(0x7dea60): pending 0x4662050 for tls/178.76.132.10:5061 (already 1) tport_wakeup(0x7dea60): events IN tport_recv_event(0x7dea60) tport_tls_recv(0x7dea60): tls_read() returned 558 tport_recv_iovec(0x7dea60) msg 0x46952f0 from (tls/178.76.132.10:5061) has 558 bytes, veclen = 1 tport_deliver(0x7dea60): msg 0x46952f0 (558 bytes) from tls/178.76.132.10:5061/sips next=0x0 nta: received 200 OK for REGISTER (18216633) nta: 200 OK is going to a transaction nta_outgoing: RTT is 48.83 ms tport_release(0x7dea60): 0x46930c0 by 0x4666910 with 0x46952f0 nua(): refresh register after 569 seconds (in [540..570]) tport(0x7dea60): reset timer tport_pend(0x7dea60): pending 0x0 for tls/178.76.132.10:5061 (already 1) nta: outgoing_free(0x4666910) tport(0x7dea60): reset timer tport_wakeup(0x7dea60): events IN tport_recv_event(0x7dea60) tport_tls_recv(0x7dea60): tls_read() returned 522 tport_recv_iovec(0x7dea60) msg 0x4694db0 from (tls/178.76.132.10:5061) has 522 bytes, veclen = 1 tport_deliver(0x7dea60): msg 0x4694db0 (522 bytes) from tls/178.76.132.10:5061/sips next=0x0 nta: received 200 OK for SUBSCRIBE (18216633) nta: 200 OK is going to a transaction nta_outgoing: RTT is 76.148 ms tport_release(0x7dea60): 0x4662050 by 0x468aed0 with 0x4694db0 nua(): refresh subscribe after 570 seconds (in [540..570]) nta: outgoing_free(0x468aed0) tport(0x7dea60): reset timer tport_wakeup(0x7dea60): events IN tport_recv_event(0x7dea60) tport_tls_recv(0x7dea60): tls_read() returned 673 tport_recv_iovec(0x7dea60) msg 0x4662050 from (tls/178.76.132.10:5061) has 673 bytes, veclen = 1 tport_deliver(0x7dea60): msg 0x4662050 (673 bytes) from tls/178.76.132.10:5061/sips next=0x0 nta: received NOTIFY sips:2000@192.168.1.100:10131 SIP/2.0 (CSeq 102) nta: canonizing sips:2000@192.168.1.100:10131 with contact nta: NOTIFY (102) going to existing leg nua: nua_stack_process_request: entering nua(0x46937b0): nua_notify_server_preprocess: active () tport_tsend(0x7dea60) tpn = TLS/178.76.132.10:5061 tport_tls_writevec: vec 0x465ba60 0xb72400 462 (462) tport_vsend returned 462 tport(0x7dea60): reset timer nta: sent 200 OK for NOTIFY (102) nta: incoming_free(0x4664480) tport(0x7dea60): reset timer nua: nua_application_event: entering nua: nua_application_event: entering nua: nua_application_event: entering nua: nua_respond: entering nua(0x46937b0): sent signal r_respond nua: nua_application_event: entering tport_wakeup(0x7dea60): events IN HUP tport_shutdown0(0x7dea60, 2) tport_close(0x7dea60): tls/178.76.132.10:5061/sips tport_release(0x7dea60): 0x0 by 0x7df6b0 with 0x0 nua_register(0x7b5040): tport to tls/178.76.132.10:5061 closed nua(): refresh register after 0 seconds (in [0..0]) tport(0x7dea60): set timer at 0 ms because zap nta: selecting scheme sips tport_tsend(0x465af70) tpn = tls/178.76.132.10:5061 tport_resolve addrinfo = 178.76.132.10:5061 tport_by_addrinfo(0x465af70): not found by name tls/178.76.132.10:5061 tport_alloc_secondary(0x465af70): new secondary tport 0x4661080 tport_tls_connect(0x4661080): connecting to tls/178.76.132.10:5061/sips tport(0x4661080): reset timer tport_queue(0x4661080): queueing 0x46941b0 for tls/178.76.132.10:5061 nta: sent REGISTER (18216634) to tls/178.76.132.10:5061 tport_pend(0x4661080): pending 0x46941b0 for tls/178.76.132.10:5061 (already 0) tls_connect(0x4661080): events CONNECTING tls_connect(0x4661080): events NEGOTIATING tls_connect(0x4661080): events NEGOTIATING tport_send_event(0x4661080) - ready to send to (tls/178.76.132.10:5061) tport_tls_writevec: vec 0x465ba60 0xb5ca00 483 (483) tport_vsend returned 483 tport_tls_set_events(0x4661080): logical events IN real IN tport(0x4661080): reset timer tport_wakeup(0x4661080): events IN tport_recv_event(0x4661080) tport_tls_recv(0x4661080): tls_read() returned 526 tport_recv_iovec(0x4661080) msg 0x468e450 from (tls/178.76.132.10:5061) has 526 bytes, veclen = 1 tport_deliver(0x4661080): msg 0x468e450 (526 bytes) from tls/178.76.132.10:5061/sips next=0x0 nta: received 401 Unauthorized for REGISTER (18216634) nta: 401 Unauthorized is going to a transaction nta_outgoing: RTT is 242.641 ms tport_release(0x4661080): 0x46941b0 by 0x4693d10 with 0x468e450 auth_digest_challenge_get(): got 4 auth_digest_a1() has A1 = MD5(2000:asterisk:1234) = 3ef464e089ec15ab06967d09b2fa0c63 A2 = MD5(REGISTER:sips:178.76.132.10) auth_response: 730260601e6a8293775a34c645bb1d28 = MD5(3ef464e089ec15ab06967d09b2fa0c63:2f52e456:22a2be38885d846b002befc573cf091e) (qop=NONE) nta: selecting scheme sips tport_tsend(0x465af70) tpn = tls/178.76.132.10:5061 tport_resolve addrinfo = 178.76.132.10:5061 tport_by_addrinfo(0x465af70): found 0x4661080 by name tls/178.76.132.10:5061 tport_tls_writevec: vec 0x465ba60 0xb72000 644 (644) tport_vsend returned 644 tport(0x4661080): reset timer nta: sent REGISTER (18216635) to tls/178.76.132.10:5061 tport_pend(0x4661080): pending 0x4694420 for tls/178.76.132.10:5061 (already 0) nta: outgoing_free(0x4693d10) tport(0x4661080): reset timer tport_wakeup(0x4661080): events IN tport_recv_event(0x4661080) tport_tls_recv(0x4661080): tls_read() returned 558 tport_recv_iovec(0x4661080) msg 0x46941b0 from (tls/178.76.132.10:5061) has 558 bytes, veclen = 1 tport_deliver(0x4661080): msg 0x46941b0 (558 bytes) from tls/178.76.132.10:5061/sips next=0x0 nta: received 200 OK for REGISTER (18216635) nta: 200 OK is going to a transaction nta_outgoing: RTT is 47.138 ms tport_release(0x4661080): 0x4694420 by 0x4695450 with 0x46941b0 nua(): refresh register after 543 seconds (in [540..570]) tport(0x4661080): reset timer tport_pend(0x4661080): pending 0x0 for tls/178.76.132.10:5061 (already 0) nta: outgoing_free(0x4695450) tport(0x4661080): reset timer nua: nua_application_event: entering nua: nua_application_event: entering tport_wakeup(0x4661080): events IN HUP tport_shutdown0(0x4661080, 2) tport_close(0x4661080): tls/178.76.132.10:5061/sips tport_release(0x4661080): 0x0 by 0x7df6b0 with 0x0 nua_register(0x7b5040): tport to tls/178.76.132.10:5061 closed nua(): refresh register after 0 seconds (in [0..0]) tport(0x4661080): set timer at 0 ms because zap nta: selecting scheme sips tport_tsend(0x465af70) tpn = tls/178.76.132.10:5061 tport_resolve addrinfo = 178.76.132.10:5061 tport_by_addrinfo(0x465af70): not found by name tls/178.76.132.10:5061 tport_alloc_secondary(0x465af70): new secondary tport 0x46952f0 tport_tls_connect(0x46952f0): connecting to tls/178.76.132.10:5061/sips tport(0x46952f0): reset timer tport_queue(0x46952f0): queueing 0x46941b0 for tls/178.76.132.10:5061 nta: sent REGISTER (18216636) to tls/178.76.132.10:5061 178.76.132.10178.76.132.10178.76.132.10178.76.132.10178.76.132.10178.76.132.10 ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Sofia-sip-devel mailing list Sofia-sip-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sofia-sip-devel