Hi Andrei!
Am 22.02.2010 20:00, schrieb Andrei Pelinescu-Onciul:
What exactly did you need to do for reproducing it
with a snom (any
settings you think there might be relevant both on the phone and in the
tls handling in the script)?
I think the script is not relevant. Seems like it crashes immediately
with the first TLS request before entering script.
[1323]: DEBUG: <core> [ip_addr.c:116]: tcpconn_new: new tcp connection:
83.136.33.3
[1323]: DEBUG: <core> [tcp_main.c:1052]: tcpconn_new: on port 2239, type 3
[1323]: DEBUG: <core> [tcp_main.c:1351]: tcpconn_add: hashes:
638:2058:3048, 1
[1323]: DEBUG: <core> [io_wait.h:361]: DBG: io_watch_add(0x8217f60, 27,
2, 0xb60e6390), fd_no=19
[1323]: DEBUG: <core> [io_wait.h:588]: DBG: io_watch_del (0x8217f60, 27,
-1, 0x0) fd_no=20 called
[1323]: DEBUG: <core> [tcp_main.c:3627]: tcp: DBG: sendig to child, events 1
[1323]: DEBUG: <core> [tcp_main.c:3336]: send2child: to tcp child 0
10(1319), 0xb60e6390
[1319]: DEBUG: <core> [tcp_read.c:884]: received n=4 con=0xb60e6390, fd=8
[1319]: DEBUG: tls [tls_server.c:109]: Using TLS domain TLSs<default>
[1323]: : <core> [pass_fd.c:283]: ERROR: receive_fd: EOF on 18
[1323]: DEBUG: <core> [tcp_main.c:3038]: DBG: handle_ser_child: dead
child 10, pid 1319 (shutting down?)
[1323]: DEBUG: <core> [io_wait.h:588]: DBG: io_watch_del (0x8217f60, 18,
-1, 0x0) fd_no=19 called
[1323]: DEBUG: <core> [tcp_main.c:2826]: DBG: handle_tcp_child: dead tcp
child 0 (pid 1319, no 10) (shutting down?)
[1323]: DEBUG: <core> [io_wait.h:588]: DBG: io_watch_del (0x8217f60, 20,
-1, 0x0) fd_no=18 called
[1297]: ALERT: <core> [main.c:722]: child process 1319 exited by a signal 11
Attached is the complete log file from kamailio startup until crash with
first message.
Further I have attached the bt of the generated cores (2 cores were
generated). As you already said this looks like a bug in openssl.
# cat /etc/redhat-release
CentOS release 5.4 (Final)
# rpm -qa|grep ssl
openssl-devel-0.9.8e-12.el5_4.1
openssl-0.9.8e-12.el5_4.1
Strangly, the ciphers announced by SNOM do not indicate Kerberos at all:
SSL Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.0 (0x0301)
Length: 63
Handshake Protocol: Client Hello
Handshake Type: Client Hello (1)
Length: 59
Version: TLS 1.0 (0x0301)
Random
Session ID Length: 0
Cipher Suites Length: 20
Cipher Suites (10 suites)
Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004)
Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005)
Cipher Suite: TLS_RSA_WITH_NULL_MD5 (0x0001)
Cipher Suite: TLS_RSA_WITH_NULL_SHA (0x0002)
Cipher Suite: TLS_DH_anon_WITH_3DES_EDE_CBC_SHA (0x001b)
Cipher Suite: TLS_DH_anon_WITH_RC4_128_MD5 (0x0018)
Cipher Suite: TLS_RSA_WITH_DES_CBC_SHA (0x0009)
Cipher Suite: TLS_RSA_EXPORT1024_WITH_RC4_56_SHA (0x0064)
Cipher Suite: TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA (0x0062)
Cipher Suite: TLS_DH_anon_WITH_DES_CBC_SHA (0x001a)
Compression Methods Length: 1
Compression Methods (1 method)
Compression Method: null (0)
Attached is also the pcap file of the SNOM phone.
regards
Klaus