[OpenSIPS-Users] sip-ChatServer Not accepting TLS Cert from Client

mani sivaraman mani.opensips at gmail.com
Mon Nov 23 23:06:52 CET 2009


sip-ChatServer is the MSRP Chat Server written in Python (by AG) and runs in
conjunction with opensips Server. OPensips routes chat session request INV
to sip-chatServer to handle it. This is more of a question for
sip-ChatServer. The sip-ChatServer accepts the INV and creates a chat room
and the sip session is established. But it rejects the incoming MSRPS media
connection. I guess it is due to client cert. I generated self signed client
auth cert on my PC using openssl. The following is the SSL Dump on the
server during connection.

Any pointer why the chat server rejects MSRPS connection will be
appreciated.

*Chat-Server Logs:*

Listening for incoming MSRPS connections on 63.148.166.215:2858

Incoming connection from 63.148.166.3:50233

Closed connection to 63.148.166.3:50233



*SSL DUMP on Server ( when trying to connect to sip-chatServer ) :***

New TCP connection #2: 63.148.166.3(51615) <-> smithmicro.com(2858)

2 1  0.0004 (0.0004)  C>S  Handshake

      ClientHello

        Version 3.1

        cipher suites

        Unknown value 0x39

        Unknown value 0x38

        Unknown value 0x35

        TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA

        TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA

        TLS_RSA_WITH_3DES_EDE_CBC_SHA

        Unknown value 0x33

        Unknown value 0x32

        Unknown value 0x2f

        TLS_RSA_WITH_IDEA_CBC_SHA

        TLS_DHE_DSS_WITH_RC4_128_SHA

        TLS_RSA_WITH_RC4_128_SHA

        TLS_RSA_WITH_RC4_128_MD5

        TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA

        TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA

        TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5

        TLS_DHE_RSA_WITH_DES_CBC_SHA

        TLS_DHE_DSS_WITH_DES_CBC_SHA

        TLS_RSA_WITH_DES_CBC_SHA

        TLS_DHE_DSS_WITH_RC2_56_CBC_SHA

        TLS_RSA_EXPORT1024_WITH_RC4_56_SHA

        TLS_RSA_EXPORT1024_WITH_RC4_56_MD5

        TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA

        TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA

        TLS_RSA_EXPORT_WITH_DES40_CBC_SHA

        TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5

        TLS_RSA_EXPORT_WITH_RC4_40_MD5

        compression methods

                  NULL

2 2  0.0015 (0.0010)  S>C  Handshake

      ServerHello

        Version 3.1

        session_id[32]=

          e2 f0 2c 8d cf f1 11 fc 0c f6 e9 7e e2 5d 67 75

          4f 13 39 40 c7 f0 20 dc 57 9e 3a 2b 05 40 93 93

        cipherSuite         TLS_RSA_WITH_3DES_EDE_CBC_SHA

        compressionMethod                   NULL

2 3  0.2746 (0.2730)  S>C  Handshake

      Certificate

*2 4  0.2746 (0.0000)  S>C  Handshake*

*      CertificateRequest*

*        certificate_types                   rsa_sign*

*        certificate_types                   dss_sign*

2 5  0.2746 (0.0000)  S>C  Handshake

      ServerHelloDone

2 6  0.2766 (0.0020)  C>S  Handshake

      Certificate

2 7  0.2766 (0.0000)  C>S  Handshake

      ClientKeyExchange

2 8  0.2766 (0.0000)  C>S  ChangeCipherSpec

2 9  0.2766 (0.0000)  C>S  Handshake

2 10 0.2826 (0.0059)  S>C  ChangeCipherSpec

2 11 0.6027 (0.3201)  S>C  Handshake

2 12 0.6087 (0.0060)  C>S  application_data

2 13 0.6087 (0.0000)  C>S  application_data

2 14 0.6109 (0.0021)  S>C  application_data

2 15 0.6114 (0.0004)  S>C  Alert

2    0.6114 (0.0000)  S>C  TCP FIN

2 16 0.6341 (0.0227)  C>S  Alert
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.opensips.org/pipermail/users/attachments/20091123/a3585d4b/attachment-0001.htm 


More information about the Users mailing list