Klaus Darilion schrieb:


David Loh schrieb:
Hi Klaus,

So in order to make it work, the RURI of Asterisk uses should contain "transport=TLS" right.

yes

if the "transport=TLS" can be appended to the SIP message, the disconnection shall be handle properly ?

yes


Currently I'm struggling w/ subst/subst_uri ... it's seems the Regex textops module used was slightly different from Unix, I do "subst('/^BYE(.*)SIP\/2\.0/BYE\1;transport=TLS SIP\/2\.0/ ');" but it doesn't work ... I'm not sure if subst able to alter the header but if it doesn't, is there any command that I can use to alter the BYE header ?

There is no need to use subst - just rewrite the request URI. E.g. in openser 1.2 the following should work:

if (loose_route()) {
   ...
   if (src_ip == ip.address.of.asterisk) {
      $ru = $ru + ";transport=tls";

I do not know for sure, but maybe it is necessary to reset the duri (may be set during loose_route()):

        resetdsturi();


   }
   ...
   t_relay();
   exit;
}

regards
klaus




Thanks,
David Loh

Klaus Darilion wrote:
Route headers are fine - the problem is the RURI of the BYE:

See the Contact header of the INVITE:
Contact: <sip:[EMAIL PROTECTED]:4294;transport=TLS>

This URI must be used in the RURI of the BYE, but Asterisk uses:
BYE sip:[EMAIL PROTECTED]:4294 SIP/2.0

Thus, the proxy forwards the request with UDP instead of TLS. Thus, this is a bug in Asterisk. Try update Asterisk. Try looking at Asterisk Bug tracker for this bug. If you are unlucky, open a bug report on the Asterisk bug tracker (bugs.digium.com)

regards
klaus

David Loh schrieb:
Hi,

Arrggghh .. that's one of my attempts to eliminate the broken "BYE" problem... that's ngrep was captured when I set "modparam("rr", "enable_double_rr", "0");", I've paste another ngrep to http://pastebin.ca/674450, this time the double RR header is enabled. And I've posted my .cfg to http://pastebin.ca/Nx0Ss4Fd (key to decrypt the post is "openser").

Even though double RR header is enabled, but for BYE it's still doesn't process properly :( For the .cfg file line #130 onward, I did tried t_relay, forward and force_send_socket, but none of this will do the trick (force_send_socket was complaining TLS error due to missing certificate (?) )
Would appreciate if anyone could enlighten me why is this happen ?


Thanks,
David Loh



Klaus Darilion wrote:
But the INVITE you posted at http://pastebin.ca/673392 also has only one Record-Route header.

regards
klaus

David Loh schrieb:
Hi,

Yea, OpenSER proxy was add 2 record-route header for the INVITE/ACK ...but when asterisk disconnected the call and send BYE back to OpenSER, the TLS RR header wasn't present, the only 2 RR header was "SIP/2.0/UDP <OpenSER_IP>" and "SIP/2.0/UDP <Client_WAN_IP>" ....
I'm puzzled ... is there any command to 'fix' this?


Regards,
David Loh

Klaus Darilion wrote:
The openser proxy should add 2 record-route header (TLS and UDP = double record route). This is why it does not work.

regards
klaus

David Loh schrieb:
Hi All,

Greeting.

I've been struggle with OpenSER TLS implementation for more than a week, since I've ported from UDP to TLS, everything work fine except the "BYE" request from Asterisk (loose route), my implementation was something like below:

[Client] --> [Router] --> [Internet] --> [SIP] --> [Asterisk]

My OpenSER.cfg already configured to listen on two port which is :- "tls:eth0:5061" and "udp:eth0:5060", client make p2p or PSTN (or even voicemail) having no problem, but when the callee disconnect the call, caller will never get hang up :(

I've attached my ethereal trace/ngrep to pastebin,
http://pastebin.ca/673392

Wondering if anyone can help me with the broken "BYE" that returned from Asterisk ? Line #131, supposedly this line should have contain 2 Via header, one was "SIP/2.0/UDP" and another "SIP/2.0/TLS", but somehow the TLS via header was gone !! (compare to previous ACK (Line #117) /INVITE (Line #51). Due to the missing TLS via header, OpenSER log file was complaining "protocol/port mis-match".

The last BYE request (Line #256) is actually firing from Client, which contain the "TLS" via.


I've even tried "force_send_socket" to port 5061 (instead of 5060) from loose route, but it complaining TLS certificate error, since Asterisk doesn't support TLS natively, I've no clue why is the ACK/INVITE/CANCEL work but not BYE.
if (loose_route) {
....
if(is_method("BYE")) {   force_send_socket(IP:5061);  }
}


Has any one gone through of this kinda OpenSER over TLS + Asterisk setup, I'm really appreciate if you can share your experience with me, or pin point what's the mistakes I made here.

Thanks in advance.

Regards,
David Loh




_______________________________________________
Users mailing list
Users@openser.org
http://openser.org/cgi-bin/mailman/listinfo/users













_______________________________________________
Users mailing list
Users@openser.org
http://openser.org/cgi-bin/mailman/listinfo/users

_______________________________________________
Users mailing list
Users@openser.org
http://openser.org/cgi-bin/mailman/listinfo/users

Reply via email to