I have the following settings in tls.cfg and I'd like to verify the server certificate IF one is provided on outbound (client) connections, but this doesn't seem possible and set_verification spits out **Server MUST present valid certificate**. The default tls.cfg https://github.com/kamailio/kamailio/blob/master/modules/tls/tls.cfg#L41 seems to indicate that this is possible.
```
[client:default]
method = TLSv1+
verify_certificate = yes
require_certificate = no
private_key = /etc/kamailio/our.key.pem
certificate = /etc/kamailio/our.crt.pem
verify_depth = 2
ca_list = /etc/pki/tls/cert.pem
```
When starting Kamailio...
```
INFO: tls [tls_domain.c:278]: fill_missing(): TLSc<default>: tls_method=20
INFO: tls [tls_domain.c:290]: fill_missing(): TLSc<default>: certificate='/etc/kamailio/our.crt.pem'
INFO: tls [tls_domain.c:297]: fill_missing(): TLSc<default>: ca_list='/etc/pki/tls/cert.pem'
INFO: tls [tls_domain.c:304]: fill_missing(): TLSc<default>: crl='(null)'
INFO: tls [tls_domain.c:308]: fill_missing(): TLSc<default>: require_certificate=0
INFO: tls [tls_domain.c:322]: fill_missing(): TLSc<default>: private_key='/etc/kamailio/our.key.pem'
INFO: tls [tls_domain.c:326]: fill_missing(): TLSc<default>: verify_certificate=1
INFO: tls [tls_domain.c:329]: fill_missing(): TLSc<default>: verify_depth=2
INFO: tls [tls_domain.c:667]: set_verification(): TLSc<default>: Server MUST present valid certificate
```
---
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/551
The connection timeout was hardcoded to 1 sec. This can now be set from cfg file.
If the redis server became unresponsive kamailio would wait for the standard Linux TCP timeout for an answer (very long time).
This patch has added an timeout value for redis commands.
The default timeout is 1 sec.
[30-redis-timeout.txt](https://github.com/kamailio/kamailio/files/198503/30-…
---
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/557
For immediate release:
ATLANTA, GA (1 April 2016)--Alex J. Balashov, a self-styled
businessman based in Atlanta, Georgia, USA, has a plan to "Make
Kamailio Great Again".
"Evariste Systems is huge. My name is on the building," said
Balashov of his iconic VoIP consulting brand.
"And you know what, I have been very successful. Everybody loves me."
Balashov has capitalised on a contentious election cycle marked by
deep political polarisation, growing income inequality and geopolitical
challenges such as global terrorism. And his sharp message of alarm
about the declining influence of the Kamailio SIP server project has
resonated with increasing numbers in the CxO suite, vaulting him to
the lead in the race for the IETF SIP Working Group nomination,
according to recent polls of primary voters.
He has been quick to tout his competitive credentials in a tough
global open-source ecosystem. At a recent colloqium on unified
communications, he asked:
"When was the last time anybody saw us beating, let's say, OpenSIPS
in Git commits? They kill us. I beat OpenSIPS all the time. All the
time."
As Balashov sees it, a major cause of the beleaguered Kamailio
project's woes lies in its liberal patch acceptance policy and
lax scrutiny of third-party contributions:
"When GitHub sends its people, they're not sending their best.
They're not sending you. They're not sending you. They're sending
people that have lots of problems, and they're bringing those
problems. They're bringing drugs. They're bringing crime. They're
rapists. And some, I assume, are good people."
He has proposed a controversial solution that has drawn ire from
liberal ranks in the open-source community, but has also attracted
applause and standing ovations at his speaking engagements:
"We have to have a firewall around the Kamailio source code. We
have to have an access control list. And in that firewall, we're
going to have a big fat door where commits and pull requests can
come into the master branch, but they have to come in legally.
The firewall will go up, and GitHub will start behaving."
Balashov's firewall proposal has been met with scorn from critics who
deride it as impractical and quixotic. In particular, commentators
have raised questions about funding and resources as well as GitHub's
willingness to entertain a boundary around a project in its vicinity.
Balashov isn't concerned, however:
"I will build a great firewall--and nobody builds firewalls better
than me, believe me--and I'll build them very inexpensively. I will
build a great, great stateful packet inspection wall on our border
with GitHub, and I will make GitHub pay for that wall. Mark my words."
He has also been rebuked by rival IETF leadership candidates for his
often acerbic Twitter remarks directed at Lennart Poettering and the
developers of "firewalld". As he sees it, however, the network effects
of social media are a strength: "My Twitter has become so powerful
that I can actually make my enemies tell the truth." He scoffed at
the suggestion that his characterisations of industry actors behind
the RedHat-led "systemd" movement are misleading:
"RedHat was the worst Steward of Linux in the history of the kernel.
There has never been a Steward so bad as RedHat. The source code
blew up around us. We lost everything, including all synergies.
There wasn't one good thing that came out of that administration or
them being Stewards of Linux."
Balashov's idiosyncratic campaign is not standing still. He has proven
to be a capable populist, adapting rapidly to an evolving sense of the
kinds of pronouncements that activate his swelling crowds of devotees.
Along the way, he has deftly deflected calls to subject his policy
proposals to expert review.
"I know what I'm doing, and I listen to a lot of people, I talk to
a lot of people, and at the appropriate time I'll tell you who
the people are. But I speak to a lot of people, but my primary
consultant is myself, and I have a good instinct for this stuff."
At a recent gathering of SIP stack interoperability specialists,
Balashov the latest pillar of his platform to "Make Kamailio Great
Again", in view of growing security vulnerabilities in the latest
Kamailio modules:
"Alex J. Balashov is calling for a total and complete shutdown of
commits entering the master branch from the territory of the European
Union until our project's representatives can figure out what's going
on. According to Netcraft, among others, there are a lot of buffer
overflows in Kamailio by large segments of the EU population."
Module: kamailio
Branch: 4.4
Commit: e6dd2c172be3712e8c468cbe7e55ba94d81a7b62
URL: https://github.com/kamailio/kamailio/commit/e6dd2c172be3712e8c468cbe7e55ba9…
Author: Daniel-Constantin Mierla <miconda(a)gmail.com>
Committer: Daniel-Constantin Mierla <miconda(a)gmail.com>
Date: 2016-04-01T11:23:19+02:00
core: test if AF_PACKET is defined at compile time
- mac os x (and perhaps *BSDs) doesn't have it
(cherry picked from commit 8543993e1f702aef80887c0e72b9bf67c62c1617)
---
Modified: socket_info.c
---
Diff: https://github.com/kamailio/kamailio/commit/e6dd2c172be3712e8c468cbe7e55ba9…
Patch: https://github.com/kamailio/kamailio/commit/e6dd2c172be3712e8c468cbe7e55ba9…
---
diff --git a/socket_info.c b/socket_info.c
index 1d28977..cecfef9 100644
--- a/socket_info.c
+++ b/socket_info.c
@@ -1205,16 +1205,18 @@ int add_interfaces(char* if_name, int family, unsigned short port,
for (ifa = ifap; ifa; ifa = ifa->ifa_next)
{
+#ifdef AF_PACKET
/* skip AF_PACKET addr family since it is of no use later on */
if (ifa->ifa_addr->sa_family == AF_PACKET)
continue;
+#endif
if (if_name && strcmp(if_name, ifa->ifa_name))
continue;
if (family && family != ifa->ifa_addr->sa_family)
continue;
sockaddr2ip_addr(&addr, (struct sockaddr*)ifa->ifa_addr);
tmp=ip_addr2a(&addr);
- if (ifa->ifa_flags & IFF_LOOPBACK)
+ if (ifa->ifa_flags & IFF_LOOPBACK)
flags = SI_IS_LO;
else
flags = SI_NONE;
Module: kamailio
Branch: 4.4
Commit: 4992dfbb9f15cfb8ade99be4e6d3087146cb8e22
URL: https://github.com/kamailio/kamailio/commit/4992dfbb9f15cfb8ade99be4e6d3087…
Author: schoberw <walter.schober(a)neotel.at>
Committer: Daniel-Constantin Mierla <miconda(a)gmail.com>
Date: 2016-04-01T11:23:03+02:00
core: skip address family AF_PACKET on -l iface_name
- socket_info.c: getifaddrs() returns AF_PACKET, AF_INET and AF_INET6 addressed of an interface.
AF_PACKET are of no use and breaks startup with an -l eth0:5060 cmd line param
(cherry picked from commit d7fca53e8c5409849ec044098a143e7254129c00)
---
Modified: socket_info.c
---
Diff: https://github.com/kamailio/kamailio/commit/4992dfbb9f15cfb8ade99be4e6d3087…
Patch: https://github.com/kamailio/kamailio/commit/4992dfbb9f15cfb8ade99be4e6d3087…
---
diff --git a/socket_info.c b/socket_info.c
index d06fdcf..1d28977 100644
--- a/socket_info.c
+++ b/socket_info.c
@@ -1205,6 +1205,9 @@ int add_interfaces(char* if_name, int family, unsigned short port,
for (ifa = ifap; ifa; ifa = ifa->ifa_next)
{
+ /* skip AF_PACKET addr family since it is of no use later on */
+ if (ifa->ifa_addr->sa_family == AF_PACKET)
+ continue;
if (if_name && strcmp(if_name, ifa->ifa_name))
continue;
if (family && family != ifa->ifa_addr->sa_family)