[OpenSIPS-Users] TLS handshake failure: SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:s23_clnt.c:770:

Nabeel nabeelshikder at gmail.com
Wed Jun 24 04:37:26 CEST 2015


Well, I'm trying to connect my server to that specific SIP client, and
wondering if the cause of the error is SSL version 2 being disabled.  Once
I've found the cause of the error I can try to make my own application more
secure.
On 24 Jun 2015 02:58, "Babil (Golam Sarwar)" <gsbabil at gmail.com> wrote:

> SSL version 2.0 has some serious flaws including undetectable downgrade
> attacks [0], rendering the SSL protection worthless, and strictly not
> recommended for production environments. Are you sure you want this for
> your users?
>
> [0]
>
> http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0.2C_2.0_and_3.0
>
>
> On 23/06/2015 6:45 PM, Nabeel wrote:
> > How can I enable SSL version 2 on OpenSIPS?
> >
> > On 23 Jun 2015 21:59, "Nabeel" <nabeelshikder at gmail.com
> > <mailto:nabeelshikder at gmail.com>> wrote:
> >
> >     This is the full log.... is it using SSL version 2 which is disabled
> >     in OpenSIPs?
> >     In particular, this part:
> >
> >      "SIP/2.0 500 Server error occurred (7/TM)
> >         Via: SIP/2.0/TLS"
> >
> >     06-23 21:45:39.790  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ Initializing SSLContext for first use
> >     06-23 21:45:39.841  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ Adding the customKeyStore to trust
> >     manager for SSLContext
> >     06-23 21:45:39.944  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ Connecting socket to 87.xx.xxx.42, port
> 5061
> >     06-23 21:45:39.945  14512-21632/com.domain I/System.out﹕
> >     [socket][145] connection /87.xx.xxx.42:5061;LocalPort=41942(10000)
> >     06-23 21:45:39.946  14512-21632/com.domain I/System.out﹕
> >     [CDS]connect[/87.xx.xxx.42:5061] tm:10
> >     06-23 21:45:40.088  14512-21632/com.domain I/System.out﹕
> >     [socket][/192.168.0.11:41942 <http://192.168.0.11:41942>] connected
> >     06-23 21:45:40.092  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ Local address is: /192.168.0.11:41942
> >     <http://192.168.0.11:41942>
> >     06-23 21:45:40.094  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ Starting SSL handshake
> >     06-23 21:45:40.155  14512-21632/com.domain E/NativeCrypto﹕
> >     ssl=0x55751d88 cert_verify_callback x509_store_ctx=0x56f378b8 arg=0x0
> >     06-23 21:45:40.155  14512-21632/com.domain E/NativeCrypto﹕
> >     ssl=0x55751d88 cert_verify_callback calling verifyCertificateChain
> >     authMethod=RSA
> >     06-23 21:45:40.199  14512-14512/com.domain I/SipUA:﹕
> >     android.net.wifi.SCAN_RESULTS
> >     06-23 21:45:40.316  14512-21632/com.domain I/AppendingTrustManager﹕
> >     Trusting a server certificate based on local trust store
> >     06-23 21:45:40.357  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ Getting SSL session
> >     06-23 21:45:40.357  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ Checking SSL session validity
> >     06-23 21:45:40.358  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ Secure connection established
> >     06-23 21:45:40.361  14512-21632/com.domain
> >     I/org.zoolu.net.TcpSocket﹕ TcpSocket now ready
> >     06-23 21:45:40.374  14512-21632/com.domain I/AndroidTimer﹕ created
> >     an AndroidTimer for 840000 MILLISECONDS, id =
> >     siptimer:f7b935cc-dd7c-477a-b1cd-1818beec08c2
> >     06-23 21:45:40.375  14512-21632/com.domain I/IntegratedSipProvider﹕
> >     connection tcp: opened
> >     06-23 21:45:40.376  14512-21632/com.domain I/IntegratedSipProvider﹕
> >     active connenctions:
> >     06-23 21:45:40.377  14512-21632/com.domain I/IntegratedSipProvider﹕
> >     conn-id=tls:87.xx.xxx.42:5061: tcp:
> >     06-23 21:45:40.378  14512-21632/com.domain I/IntegratedSipProvider﹕
> >     sending data through conn tcp:
> >     06-23 21:45:40.412  14512-21631/com.domain I/System.out﹕
> >     [CDS]close[34412]
> >     06-23 21:45:40.413  14512-21631/com.domain I/System.out﹕ close
> >     [socket][/0.0.0.0:34412 <http://0.0.0.0:34412>]
> >     06-23 21:45:40.570  14512-21641/com.domain I/AndroidTimer﹕ created
> >     an AndroidTimer for 840000 MILLISECONDS, id =
> >     siptimer:e730036d-5a22-4666-9de6-e1a1ec6fb517
> >     06-23 21:45:40.573  14512-21641/com.domain I/IntegratedSipProvider﹕
> >     message:
> >         SIP/2.0 500 Server error occurred (7/TM)
> >         Via: SIP/2.0/TLS
> >     192.168.0.11:49068
> ;received=192.168.0.11;rport=41942;branch=z9hG4bK71382
> >
> >
> >
> > _______________________________________________
> > Users mailing list
> > Users at lists.opensips.org
> > http://lists.opensips.org/cgi-bin/mailman/listinfo/users
> >
>
> --
> Regards,
> Babil (Golam Sarwar)
>
> PGP Key Fingerprint : D3A1 EED0 5BA0 72D3 A011 75CB 8EA6 7D99 F433 E92D
> PGP Key Download URL: http://bit.ly/gsbabil-pgp-key
>
>
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/users/attachments/20150624/6487b140/attachment-0001.htm>


More information about the Users mailing list