<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<font face="monospace">Hi,<br>
<br>
That;s a really bad example of how to hide trash beneath the
carpet :(....<br>
<br>
The instructions on how to get a backtrace are simple and clear
[1] - please consider doing this and helping back the project you
are using.<br>
<br>
[1] <a class="moz-txt-link-freetext" href="https://www.opensips.org/Documentation/TroubleShooting-Crash">https://www.opensips.org/Documentation/TroubleShooting-Crash</a><br>
<br>
Best regards,<br>
</font>
<pre class="moz-signature" cols="72">Bogdan-Andrei Iancu
OpenSIPS Founder and Developer
<a class="moz-txt-link-freetext" href="https://www.opensips-solutions.com">https://www.opensips-solutions.com</a>
OpenSIPS Summit 27-30 Sept 2022, Athens
<a class="moz-txt-link-freetext" href="https://www.opensips.org/events/Summit-2022Athens/">https://www.opensips.org/events/Summit-2022Athens/</a></pre>
<div class="moz-cite-prefix">On 9/27/22 5:12 AM, jacky z wrote:<br>
</div>
<blockquote type="cite"
cite="mid:CAOB03DuFtF=8YM1zAYKhsPfeNeR845bDGubEqCvDSprVUffNnA@mail.gmail.com">
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<div dir="ltr">
<div dir="ltr">
<div dir="ltr">
<div dir="ltr">Hi Ovidiu,</div>
<div dir="ltr"><br>
</div>
<div>I solved this problem by hardcoding the cert address in
the my_con.c address. Guess the cert setup in the config
file can't be loaded correctly when my_con.c calls it.</div>
</div>
<br>
<div class="gmail_quote">
<div dir="ltr" class="gmail_attr">On Tue, Sep 27, 2022 at
7:34 AM Ovidiu Sas <<a
href="mailto:osas@voipembedded.com"
moz-do-not-send="true">osas@voipembedded.com</a>>
wrote:<br>
</div>
<blockquote class="gmail_quote" style="margin:0px 0px 0px
0.8ex;border-left:1px solid
rgb(204,204,204);padding-left:1ex">I encountered a crash
related to TLS connections and I was wondering<br>
if it's a similar issue.<br>
It seems not, the crash that I encountered happens only on
3.3.<br>
<br>
If you installed opensips from a package, you need to
install<br>
opensips-dbg package to get the debug symbols.<br>
After that, you can locate the core file on your server
and inspect it with gdb.<br>
Everything should be detailed here:<br>
<a
href="https://www.opensips.org/Documentation/TroubleShooting-Crash"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://www.opensips.org/Documentation/TroubleShooting-Crash</a><br>
<br>
-ovidiu<br>
<br>
On Mon, Sep 26, 2022 at 2:54 AM jacky z <<a
href="mailto:zjack0992@gmail.com" target="_blank"
moz-do-not-send="true">zjack0992@gmail.com</a>>
wrote:<br>
><br>
> Hi Ovidiu,<br>
><br>
> The version I am using is 3.2. I am not familiar with
the debug symbols, but guess this can be reproduced
easily. With ?tls_domain=dom1 attached after the mysql
address, it happens. Can you simply check if it is the
same behavior? If not, I will dig further by learning how
to use the debug symbols. Thanks!<br>
><br>
> On Mon, Sep 26, 2022 at 12:30 AM Ovidiu Sas <<a
href="mailto:osas@voipembedded.com" target="_blank"
moz-do-not-send="true">osas@voipembedded.com</a>>
wrote:<br>
>><br>
>> Which version of opensips are you using?<br>
>> Can you install the debug symbols and get a
backtrace from the core file?<br>
>> <a
href="https://www.opensips.org/Documentation/TroubleShooting-Crash"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://www.opensips.org/Documentation/TroubleShooting-Crash</a><br>
>><br>
>> Regards,<br>
>> Ovidiu Sas<br>
>><br>
>> On Sun, Sep 25, 2022 at 6:32 AM jacky z <<a
href="mailto:zjack0992@gmail.com" target="_blank"
moz-do-not-send="true">zjack0992@gmail.com</a>>
wrote:<br>
>> ><br>
>> > Hi Vlad,<br>
>> ><br>
>> > It seems opensips crashed when I set
?tls_domain=dom1 to enable tls connection to mysql db. I
followed the method in the manual.<br>
>> ><br>
>> > modparam("usrloc", "db_url",
"mysql://root:1234@localhost/opensips?tls_domain=dom1")<br>
>> ><br>
>> ><br>
>> > Here is the log.<br>
>> ><br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: <a class="moz-txt-link-freetext" href="INFO:tls_mgm:mod_init">INFO:tls_mgm:mod_init</a>:
initializing TLS management<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: <a class="moz-txt-link-freetext" href="INFO:tls_mgm:init_tls_dom">INFO:tls_mgm:init_tls_dom</a>:
Processing TLS domain 'dom'<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: NOTICE:tls_mgm:init_tls_dom: no
CA dir for tls 'dom' defined, using default '/etc/pki/CA/'<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: NOTICE:tls_mgm:init_tls_dom: no
crl for tls, using none<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]:
NOTICE:tls_openssl:openssl_init_tls_dom: No EC curve
defined<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]:
<a class="moz-txt-link-freetext" href="INFO:tls_openssl:get_ssl_ctx_verify_mode">INFO:tls_openssl:get_ssl_ctx_verify_mode</a>: client
verification NOT activated. Weaker security.<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: <a class="moz-txt-link-freetext" href="INFO:tls_mgm:init_tls_dom">INFO:tls_mgm:init_tls_dom</a>:
Processing TLS domain 'dom1'<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: NOTICE:tls_mgm:init_tls_dom: no
CA dir for tls 'dom1' defined, using default
'/etc/pki/CA/'<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: NOTICE:tls_mgm:init_tls_dom: no
crl for tls, using none<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]:
NOTICE:tls_openssl:openssl_init_tls_dom: No EC curve
defined<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]:
<a class="moz-txt-link-freetext" href="INFO:tls_openssl:get_ssl_ctx_verify_mode">INFO:tls_openssl:get_ssl_ctx_verify_mode</a>: server
verification NOT activated. Weaker security.<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: <a class="moz-txt-link-freetext" href="INFO:proto_tls:mod_init">INFO:proto_tls:mod_init</a>:
initializing TLS protocol<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: <a class="moz-txt-link-freetext" href="INFO:proto_bin:mod_init">INFO:proto_bin:mod_init</a>:
initializing BIN protocol<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: <a class="moz-txt-link-freetext" href="INFO:clusterer:mod_init">INFO:clusterer:mod_init</a>:
Clusterer module - initializing<br>
>> > Sep 25 10:14:01 ip-10-100-20-35
/usr/sbin/opensips[4935]: CRITICAL:core:sig_usr: segfault
in attendant (starter) process!<br>
>> > Sep 25 10:14:01 ip-10-100-20-35 kernel:
[39023.653243] opensips[4935]: segfault at 0 ip
0000000000000000 sp 00007ffececa3d08 error 14 in
opensips[558b5bb75000+1c000]<br>
>> > Sep 25 10:14:01 ip-10-100-20-35 kernel:
[39023.666503] Code: Bad RIP value.<br>
>> > Sep 25 10:14:01 ip-10-100-20-35 opensips:
<a class="moz-txt-link-freetext" href="INFO:core:daemonize">INFO:core:daemonize</a>: pre-daemon process exiting with -1<br>
>> ><br>
>> > and my client domain settings<br>
>> ><br>
>> > #client domain<br>
>> > modparam("tls_mgm", "client_domain", "dom1")<br>
>> > modparam("tls_mgm", "match_ip_address",
"[dom1]*")<br>
>> > modparam("tls_mgm", "match_sip_domain",
"[dom1]*")<br>
>> > modparam("tls_mgm","certificate",
"[dom1]/etc/ssl/certs/rootCACert.pem")<br>
>> > modparam("tls_mgm","private_key",
"[dom1]/etc/ssl/private/rootCAKey.pem")<br>
>> > modparam("tls_mgm","ca_list",
"[dom1]/etc/ssl/certs/rootCACert.pem")<br>
>> > modparam("tls_mgm","tls_method",
"[dom1]SSLv23")<br>
>> > modparam("tls_mgm","verify_cert", "[dom1]0")<br>
>> > modparam("tls_mgm","require_cert",
"[dom1]0")<br>
>> ><br>
>> > It is expected to see some other errors such
as invalid cert but not crash in pre-daemon process. Any
clue on this for me to debug? If I remove
"?tls_domain=dom1", there is no such crash though the
opensips server still couldn't start because I forced the
mysql db to use ssl connection. Thanks!<br>
>> ><br>
>> > On Mon, Sep 19, 2022 at 9:09 PM Vlad
Patrascu <<a href="mailto:vladp@opensips.org"
target="_blank" moz-do-not-send="true">vladp@opensips.org</a>>
wrote:<br>
>> >><br>
>> >> Hi Jacky,<br>
>> >><br>
>> >> I cant think of any workaround
unfortunately.<br>
>> >><br>
>> >> Regards,<br>
>> >><br>
>> >> --<br>
>> >> Vlad Patrascu<br>
>> >> OpenSIPS Core Developer<br>
>> >> <a
href="http://www.opensips-solutions.com"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://www.opensips-solutions.com</a><br>
>> >><br>
>> >> On 17.09.2022 18:46, jacky z wrote:<br>
>> >><br>
>> >> Hi Vlad,<br>
>> >><br>
>> >> Is there any workaround to disable the
client cert? Thanks!<br>
>> >><br>
>> >> On Wed, Sep 14, 2022 at 9:16 PM Vlad
Patrascu <<a href="mailto:vladp@opensips.org"
target="_blank" moz-do-not-send="true">vladp@opensips.org</a>>
wrote:<br>
>> >>><br>
>> >>> Hi Jacky,<br>
>> >>><br>
>> >>> OpenSIPS will always require you to
configure a client certificate for TLS client domains and
will also present that certificate when connecting. But
normally, a TLS server can simply choose not to verify the
client certificate. I don't have any experience with AWS
RDS though but it seems odd to not accept a connection
only because the client did present a certificate.<br>
>> >>><br>
>> >>> Regards,<br>
>> >>><br>
>> >>> --<br>
>> >>> Vlad Patrascu<br>
>> >>> OpenSIPS Core Developer<br>
>> >>> <a
href="http://www.opensips-solutions.com"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://www.opensips-solutions.com</a><br>
>> >>><br>
>> >>> On 14.09.2022 05:42, jacky z wrote:<br>
>> >>><br>
>> >>> Hi Bogdan-Andrei,<br>
>> >>><br>
>> >>> I checked the mariadb documentation
and found mariadb has two options to set ssl connection:
two-way TSL and one-way TSL. It seems AWS RDS only
supports one-way TSL, that is, TSL is used without a
client cert. Does OPENSIPS support such one-way TSL to
connect a database? Thanks!<br>
>> >>><br>
>> >>> On Wed, Sep 14, 2022 at 12:06 AM
jacky z <<a href="mailto:zjack0992@gmail.com"
target="_blank" moz-do-not-send="true">zjack0992@gmail.com</a>>
wrote:<br>
>> >>>><br>
>> >>>> Hi Bogdan-Andrei,<br>
>> >>>><br>
>> >>>> I have set the "certificate" and
"private_key" in my script, as I explained in method 1.
However, AWS RDS doesn't support a client cert. Please
refer to<br>
>> >>>> <a
href="https://stackoverflow.com/questions/53760104/how-to-configure-x509-client-certificate-based-authentication-to-connect-to-aws"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://stackoverflow.com/questions/53760104/how-to-configure-x509-client-certificate-based-authentication-to-connect-to-aws</a><br>
>> >>>><br>
>> >>>> Is there any workaround to use
the public cert list provided by AWS? Anyone has
successfully used RDS with SSL connections? Thanks!<br>
>> >>>><br>
>> >>>> On Tue, Sep 13, 2022 at 9:54 PM
Bogdan-Andrei Iancu <<a
href="mailto:bogdan@opensips.org" target="_blank"
moz-do-not-send="true">bogdan@opensips.org</a>>
wrote:<br>
>> >>>>><br>
>> >>>>> Set the certificate and key
you have in the tls_mgm module, for the "certificate" and
"private_key" parameters.<br>
>> >>>>><br>
>> >>>>> Regards,<br>
>> >>>>><br>
>> >>>>> Bogdan-Andrei Iancu<br>
>> >>>>><br>
>> >>>>> OpenSIPS Founder and
Developer<br>
>> >>>>> <a
href="https://www.opensips-solutions.com"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://www.opensips-solutions.com</a><br>
>> >>>>> OpenSIPS Summit 27-30 Sept
2022, Athens<br>
>> >>>>> <a
href="https://www.opensips.org/events/Summit-2022Athens/"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://www.opensips.org/events/Summit-2022Athens/</a><br>
>> >>>>><br>
>> >>>>> On 9/13/22 2:57 PM, jacky z
wrote:<br>
>> >>>>><br>
>> >>>>> Hi Bogdan-Andrei,<br>
>> >>>>><br>
>> >>>>> I tried two methods.<br>
>> >>>>><br>
>> >>>>> Method 1:<br>
>> >>>>><br>
>> >>>>> #enabled TLS connection:<br>
>> >>>>> modparam("db_mysql",
"use_tls", 1)<br>
>> >>>>><br>
>> >>>>> #setup a client domain:<br>
>> >>>>> modparam("tls_mgm",
"client_domain", "dom1")<br>
>> >>>>> modparam("tls_mgm",
"match_ip_address", "[dom1]*")<br>
>> >>>>> modparam("tls_mgm",
"match_sip_domain", "[dom1]*")<br>
>> >>>>>
modparam("tls_mgm","certificate",
"[dom1]/etc/ssl/certs/rootCACert.pem")<br>
>> >>>>>
modparam("tls_mgm","private_key",
"[dom1]/etc/ssl/private/rootCAKey.pem")<br>
>> >>>>>
modparam("tls_mgm","ca_list",
"[dom1]/etc/ssl/certs/rootCACert.pem")<br>
>> >>>>>
modparam("tls_mgm","tls_method", "[dom1]SSLv23")<br>
>> >>>>>
modparam("tls_mgm","verify_cert", "[dom1]0")<br>
>> >>>>>
modparam("tls_mgm","require_cert", "[dom1]0")<br>
>> >>>>> # set db_url<br>
>> >>>>> modparam("usrloc", "db_url",
"mysql://root:1234@<awsrdsaddress>/opensips?tls_domain=dom1")<br>
>> >>>>> ...<br>
>> >>>>><br>
>> >>>>> I couldn't figure out how to
use global-bundle.pem AWS provided with this method. No
luck to get a connection with RDS. If I don't use ssl,
opensips can connect to RDS without encryption.<br>
>> >>>>><br>
>> >>>>> Method 2:<br>
>> >>>>><br>
>> >>>>> I tried<br>
>> >>>>><br>
>> >>>>> modparam("usrloc", "db_url",
"mysql://root:1234@<awsrdsaddress>/opensips?ssl=true&ssl_ca_certs=/etc/ssl/certs/global-bundle.pem")<br>
>> >>>>><br>
>> >>>>> to include the AWS cert.
Still no luck.<br>
>> >>>>><br>
>> >>>>> Thanks!<br>
>> >>>>><br>
>> >>>>> On Tue, Sep 13, 2022 at 4:52
PM Bogdan-Andrei Iancu <<a
href="mailto:bogdan@opensips.org" target="_blank"
moz-do-not-send="true">bogdan@opensips.org</a>>
wrote:<br>
>> >>>>>><br>
>> >>>>>> Hi,<br>
>> >>>>>><br>
>> >>>>>> sorry for my silly
question, but how do you connect from the OpenSIPS side ??<br>
>> >>>>>><br>
>> >>>>>> Regards,<br>
>> >>>>>><br>
>> >>>>>> Bogdan-Andrei Iancu<br>
>> >>>>>><br>
>> >>>>>> OpenSIPS Founder and
Developer<br>
>> >>>>>> <a
href="https://www.opensips-solutions.com"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://www.opensips-solutions.com</a><br>
>> >>>>>> OpenSIPS Summit 27-30
Sept 2022, Athens<br>
>> >>>>>> <a
href="https://www.opensips.org/events/Summit-2022Athens/"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://www.opensips.org/events/Summit-2022Athens/</a><br>
>> >>>>>><br>
>> >>>>>> On 9/13/22 10:41 AM,
jacky z wrote:<br>
>> >>>>>><br>
>> >>>>>> Hi Team,<br>
>> >>>>>><br>
>> >>>>>> We hope to connect to
aws RDS database with ssl encryption. We have setup a
client domain according to OPENSIPS documents. However,
AWS RDS does not support client cert as someone has
confirmed with AWS <a
href="https://stackoverflow.com/questions/53760104/how-to-configure-x509-client-certificate-based-authentication-to-connect-to-aws"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://stackoverflow.com/questions/53760104/how-to-configure-x509-client-certificate-based-authentication-to-connect-to-aws</a><br>
>> >>>>>><br>
>> >>>>>> Is there any way to use
the cert provided by AWS to connect? AWS provides a
global-bundle.pem (<a
href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL.html"
rel="noreferrer" target="_blank" moz-do-not-send="true">https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL.html</a>)
for such a connection, but we don't know how to include it
in the config file.<br>
>> >>>>>><br>
>> >>>>>> Thanks<br>
>> >>>>>><br>
>> >>>>>> Jacky z<br>
>> >>>>>><br>
>> >>>>>>
_______________________________________________<br>
>> >>>>>> Users mailing list<br>
>> >>>>>> <a
href="mailto:Users@lists.opensips.org" target="_blank"
moz-do-not-send="true">Users@lists.opensips.org</a><br>
>> >>>>>> <a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
>> >>>>>><br>
>> >>>>>><br>
>> >>>>><br>
>> >>><br>
>> >>>
_______________________________________________<br>
>> >>> Users mailing list<br>
>> >>> <a
href="mailto:Users@lists.opensips.org" target="_blank"
moz-do-not-send="true">Users@lists.opensips.org</a><br>
>> >>> <a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
>> >>><br>
>> >>>
_______________________________________________<br>
>> >>> Users mailing list<br>
>> >>> <a
href="mailto:Users@lists.opensips.org" target="_blank"
moz-do-not-send="true">Users@lists.opensips.org</a><br>
>> >>> <a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
>> >><br>
>> >><br>
>> >>
_______________________________________________<br>
>> >> Users mailing list<br>
>> >> <a
href="mailto:Users@lists.opensips.org" target="_blank"
moz-do-not-send="true">Users@lists.opensips.org</a><br>
>> >> <a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
>> >><br>
>> >>
_______________________________________________<br>
>> >> Users mailing list<br>
>> >> <a
href="mailto:Users@lists.opensips.org" target="_blank"
moz-do-not-send="true">Users@lists.opensips.org</a><br>
>> >> <a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
>> ><br>
>> >
_______________________________________________<br>
>> > Users mailing list<br>
>> > <a href="mailto:Users@lists.opensips.org"
target="_blank" moz-do-not-send="true">Users@lists.opensips.org</a><br>
>> > <a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
>><br>
>><br>
>><br>
>> --<br>
>> VoIP Embedded, Inc.<br>
>> <a href="http://www.voipembedded.com"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://www.voipembedded.com</a><br>
>><br>
>> _______________________________________________<br>
>> Users mailing list<br>
>> <a href="mailto:Users@lists.opensips.org"
target="_blank" moz-do-not-send="true">Users@lists.opensips.org</a><br>
>> <a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
><br>
> _______________________________________________<br>
> Users mailing list<br>
> <a href="mailto:Users@lists.opensips.org"
target="_blank" moz-do-not-send="true">Users@lists.opensips.org</a><br>
> <a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
<br>
<br>
<br>
-- <br>
VoIP Embedded, Inc.<br>
<a href="http://www.voipembedded.com" rel="noreferrer"
target="_blank" moz-do-not-send="true">http://www.voipembedded.com</a><br>
<br>
_______________________________________________<br>
Users mailing list<br>
<a href="mailto:Users@lists.opensips.org" target="_blank"
moz-do-not-send="true">Users@lists.opensips.org</a><br>
<a
href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users"
rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a><br>
</blockquote>
</div>
</div>
</div>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<pre class="moz-quote-pre" wrap="">_______________________________________________
Users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Users@lists.opensips.org">Users@lists.opensips.org</a>
<a class="moz-txt-link-freetext" href="http://lists.opensips.org/cgi-bin/mailman/listinfo/users">http://lists.opensips.org/cgi-bin/mailman/listinfo/users</a>
</pre>
</blockquote>
<br>
</body>
</html>