한국어

소프트스위치

온누리070 플레이스토어 다운로드
    acrobits softphone
     온누리 070 카카오 프러스 친구추가온누리 070 카카오 프러스 친구추가친추
     카카오톡 채팅 상담 카카오톡 채팅 상담카톡
    
     라인상담
     라인으로 공유

     페북공유

   ◎위챗 : speedseoul


  
     PAYPAL
     
     PRICE
     

pixel.gif

    before pay call 0088 from app


https://github.com/antonraharja/book-opensips-101/blob/master/content/0.%20Table%20of%20Contents.mediawiki



https://github.com/antonraharja/book-opensips-101/blob/master/content/3.2.%20SIP%20TLS%20Secure%20Calling.mediawiki



able of Contents

Preface

Secure call can be achieved by enabling TLS. Once implemented SIP UA can choose to use transport TLS instead of UDP or TCP. The advantage of choosing TLS is that the SIP traffic exchanged between SIP UA and OpenSIPS will be encrypted, meaning it will take a considerable amount of time and effort to read it without the encryption key, if not possible.

Please note that the media it self will not be protected by this setup. In order to also secure the media, SIP UA need to be configured to use mandatory SRTP. That will force SIP UA to encrypt the media before transfer.

Several free SIP UA examples known to work or provide TLS and SRTP:

To enable TLS support in OpenSIPS we need to follow these steps:

  1. OpenSIPS and its modules compiled with option TLS=1
  2. Create TLS certificates
  3. Configure opensips.cfg with TLS options
  4. Verify config and test

We already done the first step on compile time, so we will start with step 2 in this chapter.

Step 2: Create TLS certificates

Before we start please remember that our OpenSIPS is in /root/src/opensips/opensips-1.9.1-tls/ and our installed OpenSIPS config files are in /usr/local/etc/opensips/.

Copy example openssl certificates to /usr/local/etc/opensips/tls/:

 cd /root/src/opensips/opensips-1.9.1-tls/
 cp -rR etc/tls /usr/local/etc/opensips/

Re-create local root Certificate Authority (CA). First we need to edit the ca.conf:

 cd /usr/local/etc/opensips/tls/
 vi ca.conf

Look for Please update sentence somewhere in ca.conf, they are near the bottom of the file. Update certificates parameters to suit your setups. If possible the commonName parameter is unique.

Save ca.conf and exit editor.

Run this command to re-create root CA in /usr/local/etc/opensips/tls/rootCA/:

 opensipsctl tls rootCA

Continue the process creating certificates, now we need to create our server certificate:

 cd /usr/local/etc/opensips/tls/
 cp user.conf server.conf
 vi server.conf

Look for Please update sentence somewhere in server.conf, they are quite easy to find. Update certificates parameters to suit your setups. Make sure that commonName parameter is pointing to OpenSIPS server IP, or your domain name that will be use as OpenSIPS server IP.

Run this command to create server certificate in /usr/local/etc/opensips/tls/server/:

 opensipsctl tls userCERT server

There will be 3 important files created, they are:

  • /usr/local/etc/opensips/tls/server/server-cert.pem
  • /usr/local/etc/opensips/tls/server/server-privkey.pem
  • /usr/local/etc/opensips/tls/server/server-calist.pem.

Step 3: Configure opensips.cfg with TLS options

Edit /usr/local/etc/opensips/opensips.cfg and locate for option disable_tls. By default it should have sets disable_tls=yes, meaning TLS is disabled.

Change disable_tls=yes to disable_tls=no and then paste below options:

 disable_tls = no
 listen = tls:192.168.56.45:5061
 tls_verify_server = 1
 tls_verify_client = 1
 tls_require_client_certificate = 0
 tls_method = TLSv1
 tls_certificate = "/usr/local/etc/opensips/tls/server/server-cert.pem"
 tls_private_key = "/usr/local/etc/opensips/tls/server/server-privkey.pem"
 tls_ca_list = "/usr/local/etc/opensips/tls/server/server-calist.pem"

Save the file.

Please note that our OpenSIPS 101 in this exercise is 192.168.56.45. You should change this IP to your real OpenSIPS IP.

Step 4: Verify config and test

Verify your config:

 opensips -c

Restart OpenSIPS:

 /etc/init.d/opensips.init restart

Verify whether OpenSIPS is listening in port 5061:

 netstat -lnptu | grep opensips

Use server-calist.pem on client side, do not copy other files from /usr/local/etc/opensips/tls/server/.

You can use SIP UA with TLS supports to test TLS connection to OpenSIPS. SIP UA such as Minisip and SFLphone in Linux or MicroSIP and Blink in Windows are good to use as they are free and easy to use.

On SIP UA, if possible we should disable other protocol (sometime referred as transport) and make sure we have only select TLS. Use port 5061 instead of 5060 to connect to OpenSIPS using TLS.

Some SIP UA do not have special feature to load certificates from its GUI. In this case you should import your server-calist.pem into your OS certificate repository (sometime referred as key store).

Same goes to mobile devices such as Android phone or iPhone, you should load server-calist.pem into its certificate repository rather then to load it from mobile SIP UA GUI.

Debugging SIP traffics over TLS on port 5061:

 ngrep -p -q -W byline port 5061

You should notice packets are captured but displayed as unreadable characters.

Try to make calls in TLS mode, and also try with mandatory SRTP enabled.

--
Anton Raharja
http://www.antonraharja.com

조회 수 :
42300
등록일 :
2014.03.12
10:40:30 (*.251.139.148)
엮인글 :
http://webs.co.kr/index.php?document_srl=39210&act=trackback&key=53b
게시글 주소 :
http://webs.co.kr/index.php?document_srl=39210
List of Articles
번호 제목 글쓴이 조회 수 추천 수sort 날짜
81 OpenSIPS , default script , Types of Routs , Routing in SIP, Video lecture admin 40624   2014-08-13
 
80 Configuracion de Kamailio 3.3 con NAT Traversal y XCAP. admin 36492   2014-08-12
 
79 OpenSIPS/OpenSER-a versatile SIP Server cfg admin 37537   2014-08-11
 
78 Kamailio Nat Traversal using RTPProxy admin 36489   2014-08-11
 
77 MediaProxy Installation Guide admin 39231   2014-08-10
 
76 RTPProxy 1.2.x Installation & Integration with OpenSIPS 1.5x admin 41119   2014-08-10
 
75 Opensips Installation, How to. Good guide wiki page admin 36328   2014-08-10
 
74 [OpenSIPS-Users] Opensips 1.10 NAT radius aaa admin 36350   2014-08-23
 
73 OpenSIPS Consultancy Pricing module install Server 판매 또는 설치및 컨설팅 가이드 admin 41194   2014-08-23
 
72 ICE: The ultimate way of beating NAT in SIP admin 64796   2014-08-23
 
71 MediaProxy wiki page install configuration admin 42947   2014-08-11
 
70 Under RHEL6.5 install OpenSIPS 1.11.1 tls admin 38507   2014-08-12
 
69 오픈소스 (사내)메신저 서버 구축, 오픈 파이어(openfire) 설치방법과 세팅 admin 101976   2014-08-11
 
68 OpenSIPS Installation Notes admin 47324   2014-08-09
 
67 Installation and configuration process record opensips 1.9.1 admin 95027   2014-08-09
 
66 opensips 1.11.2 install Good Giide admin 66394   2014-08-09
 
65 fusionPBX install debian wheezy admin 38215   2014-08-09
 
64 opensips 1.11.2 install guide good 인스톨 가이드 admin 44358   2014-08-09
 
63 SigIMS IMS Platform admin 37773   2014-05-24
 
62 2013 2012년 분야별 최고의 오픈소스 소프트웨어 124선 admin 63020   2014-04-05
 
61 Video conference server OpenMCU-ru - Introduction admin 54330   2014-04-01
 
60 SIPSorcery admin 43828   2014-03-18
 
59 telepresence: Open Source SIP Telepresence/MCU admin 180803   2014-03-12
 
58 SIP PBX - OpenSIPS and Asterisk configuration admin 162436   2014-03-12
 
57 Conference Support in Kamailio (OpenSER) admin 85473   2014-03-12
 
56 OpenSIPS configuration for 2 or more FreeSWITCH installs admin 74718   2014-03-12
 
55 The Impact of TLS on SIP Server Performance file admin 41817   2014-03-12
 
» book-opensips-101 / content / 3.2. SIP TLS Secure Calling.mediawiki admin 42300   2014-03-12
https://github.com/antonraharja/book-opensips-101/blob/master/content/0.%20Table%20of%20Contents.mediawiki https://github.com/antonraharja/book-opensips-101/blob/master/content/3.2.%20SIP%20TLS%20Secure%20Calling.mediawiki able of Co...  
53 Where to check OpenSIPS does not start? admin 42784   2014-03-09
 
52 Ekiga (formely known as GnomeMeeting) is an open source SoftPhone admin 41935   2014-03-12