[OpenSIPS-Users] TLS handshake failure: SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:s23_clnt.c:770:
Babil (Golam Sarwar)
gsbabil at gmail.com
Wed Jun 24 03:58:09 CEST 2015
SSL version 2.0 has some serious flaws including undetectable downgrade
attacks [0], rendering the SSL protection worthless, and strictly not
recommended for production environments. Are you sure you want this for
your users?
[0]
http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0.2C_2.0_and_3.0
On 23/06/2015 6:45 PM, Nabeel wrote:
> How can I enable SSL version 2 on OpenSIPS?
>
> On 23 Jun 2015 21:59, "Nabeel" <nabeelshikder at gmail.com
> <mailto:nabeelshikder at gmail.com>> wrote:
>
> This is the full log.... is it using SSL version 2 which is disabled
> in OpenSIPs?
> In particular, this part:
>
> "SIP/2.0 500 Server error occurred (7/TM)
> Via: SIP/2.0/TLS"
>
> 06-23 21:45:39.790 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ Initializing SSLContext for first use
> 06-23 21:45:39.841 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ Adding the customKeyStore to trust
> manager for SSLContext
> 06-23 21:45:39.944 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ Connecting socket to 87.xx.xxx.42, port 5061
> 06-23 21:45:39.945 14512-21632/com.domain I/System.out﹕
> [socket][145] connection /87.xx.xxx.42:5061;LocalPort=41942(10000)
> 06-23 21:45:39.946 14512-21632/com.domain I/System.out﹕
> [CDS]connect[/87.xx.xxx.42:5061] tm:10
> 06-23 21:45:40.088 14512-21632/com.domain I/System.out﹕
> [socket][/192.168.0.11:41942 <http://192.168.0.11:41942>] connected
> 06-23 21:45:40.092 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ Local address is: /192.168.0.11:41942
> <http://192.168.0.11:41942>
> 06-23 21:45:40.094 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ Starting SSL handshake
> 06-23 21:45:40.155 14512-21632/com.domain E/NativeCrypto﹕
> ssl=0x55751d88 cert_verify_callback x509_store_ctx=0x56f378b8 arg=0x0
> 06-23 21:45:40.155 14512-21632/com.domain E/NativeCrypto﹕
> ssl=0x55751d88 cert_verify_callback calling verifyCertificateChain
> authMethod=RSA
> 06-23 21:45:40.199 14512-14512/com.domain I/SipUA:﹕
> android.net.wifi.SCAN_RESULTS
> 06-23 21:45:40.316 14512-21632/com.domain I/AppendingTrustManager﹕
> Trusting a server certificate based on local trust store
> 06-23 21:45:40.357 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ Getting SSL session
> 06-23 21:45:40.357 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ Checking SSL session validity
> 06-23 21:45:40.358 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ Secure connection established
> 06-23 21:45:40.361 14512-21632/com.domain
> I/org.zoolu.net.TcpSocket﹕ TcpSocket now ready
> 06-23 21:45:40.374 14512-21632/com.domain I/AndroidTimer﹕ created
> an AndroidTimer for 840000 MILLISECONDS, id =
> siptimer:f7b935cc-dd7c-477a-b1cd-1818beec08c2
> 06-23 21:45:40.375 14512-21632/com.domain I/IntegratedSipProvider﹕
> connection tcp: opened
> 06-23 21:45:40.376 14512-21632/com.domain I/IntegratedSipProvider﹕
> active connenctions:
> 06-23 21:45:40.377 14512-21632/com.domain I/IntegratedSipProvider﹕
> conn-id=tls:87.xx.xxx.42:5061: tcp:
> 06-23 21:45:40.378 14512-21632/com.domain I/IntegratedSipProvider﹕
> sending data through conn tcp:
> 06-23 21:45:40.412 14512-21631/com.domain I/System.out﹕
> [CDS]close[34412]
> 06-23 21:45:40.413 14512-21631/com.domain I/System.out﹕ close
> [socket][/0.0.0.0:34412 <http://0.0.0.0:34412>]
> 06-23 21:45:40.570 14512-21641/com.domain I/AndroidTimer﹕ created
> an AndroidTimer for 840000 MILLISECONDS, id =
> siptimer:e730036d-5a22-4666-9de6-e1a1ec6fb517
> 06-23 21:45:40.573 14512-21641/com.domain I/IntegratedSipProvider﹕
> message:
> SIP/2.0 500 Server error occurred (7/TM)
> Via: SIP/2.0/TLS
> 192.168.0.11:49068;received=192.168.0.11;rport=41942;branch=z9hG4bK71382
>
>
>
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>
--
Regards,
Babil (Golam Sarwar)
PGP Key Fingerprint : D3A1 EED0 5BA0 72D3 A011 75CB 8EA6 7D99 F433 E92D
PGP Key Download URL: http://bit.ly/gsbabil-pgp-key
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.opensips.org/pipermail/users/attachments/20150623/fb5f446b/attachment.pgp>
More information about the Users
mailing list