Glad the problem was solved.

Still, maybe there is place to improve the code to properly report/log the issue - did you get any indication (in logs) that actually the key was bogus and the TLS handshake failed ?

Regards,

Bogdan-Andrei Iancu
OpenSIPS Founder and Developer
http://www.opensips-solutions.com

On 19.01.2016 17:36, Sebastian Sastre wrote:
Bodgan,

Thanks . Yes that one wasn’t an error but i had the wrong private key configured and the socket was disconnecting so i was able to generate new certs and it worked fine. I got some help from IRC.
I still see the notice but the socket stays up and i can register.

Right now i have the signaling working perfect, but i have no audio either way. Im trying to figure out why rtpengine is not working correctly.

Thanks again




On Tue, Jan 19, 2016 at 5:21 AM, Bogdan-Andrei Iancu <bog...@opensips.org <mailto:bog...@opensips.org>> wrote:

    Hi Sebastian,

    That message is just an INFO (not an error) - you say TLS
    handshake fails on opensips side as it expects a certificate from
    the end point ?

    Regards,

    Bogdan-Andrei Iancu
    OpenSIPS Founder and Developer
    http://www.opensips-solutions.com

    On 18.01.2016 06:32, Sebastian Sastre wrote:
    I’ve been trying to setup WSS using 2.2 latest branch.

    When trying to open the web socket i get “ Client did not present
    a TLS certificate” . Im using the included default ssl certs for
    the server to avoid mistakes . What certificate is the user
    supposed to present?

    I tried using sip.js and jssip to connect without any luck. i
    also tried disabling cert requirement but didn’t work.

    —— Config ——-

    listen=wss:123.456.789.987:5060
    listen=tls:123.456.789.987:5061
    listen=wss:123.456.789.987:443

    load module "proto_udp.so"
    load module “proto_tls.so”
    loadmodule "proto_wss.so"

    loadmodule "tls_mgm.so"
    modparam("tls_mgm", "certificate",
    "/etc/opensips/tls/rootCA/cacert.pem")
    modparam("tls_mgm", "private_key",
    "/etc/opensips/tls/rootCA/private/cakey.pem")
    modparam("tls_mgm", "ca_list",
    "/etc/opensips/tls/rootCA/cacert.pem")
    modparam("tls_mgm", "ca_dir", "/etc/opensips/tls/rootCA/")
    modparam("tls_mgm", "require_cert", "0")
    modparam(“tls_mgm", "verify_cert", "0")


    ——- Logs ——-
    /sbin/opensips[12468]: INFO:core:probe_max_sock_buff: using snd
    buffer of 416 kb
    /sbin/opensips[12468]: INFO:core:init_sock_keepalive: TCP
    keepalive enabled on socket 37
    /sbin/opensips[12460]: INFO:proto_wss:ls_accept: New TLS
    connection from xx.xx.xx.xx:50815 accepted
    /sbin/opensips[12460]: INFO:proto_wss:tls_accept: Client did not
    present a TLS certificate
    /sbin/opensips[12460]: INFO:proto_wss:ls_dump_cert_info:
    tls_accept: local TLS server certificate subject:
    
/CN=OpenSIPS/ST=opensips.org/C=IP/emailAddress=t...@opensips.org/O=opensips.org
    <mailto:opensips.org/C=IP/emailAddress=t...@opensips.org/O=opensips.org>,
    issuer:
    
/CN=OpenSIPS/ST=opensips.org/C=IP/emailAddress=t...@opensips.org/O=opensips.org
    <http://opensips.org/C=IP/emailAddress=t...@opensips.org/O=opensips.org>


    Thanks !



    _______________________________________________
    Users mailing list
    Users@lists.opensips.org <mailto:Users@lists.opensips.org>
    http://lists.opensips.org/cgi-bin/mailman/listinfo/users



_______________________________________________
Users mailing list
Users@lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to