Re: [SR-Users] why kamcmd tls.reload is not safe

2013-10-22 Thread Ding Ma
Here is the URL for the tls.reload discussion http://lists.iptel.org/pipermail/serdev/2006-March/007051.html This email chain has quite detailed information about tls module implementation. Multiple modules initializing openssl separately doesn't sound like a potential cause for crash. We'll loo

Re: [SR-Users] why kamcmd tls.reload is not safe

2013-10-21 Thread Olle E. Johansson
22 okt 2013 kl. 05:20 skrev Ding Ma : > Klaus, > > With the information you provided, I did find the emails initiated by Jan > Janak on this topic. Thanks. Can you please provide a URL so that the rest of us can update ourselves? > Guess our test with large RSA keys hits one of the race condi

Re: [SR-Users] why kamcmd tls.reload is not safe

2013-10-21 Thread Ding Ma
Klaus, With the information you provided, I did find the emails initiated by Jan Janak on this topic. Thanks. Guess our test with large RSA keys hits one of the race conditions when reloading TLS config, which results in kamailio crash. One thing I'm not quite clear is whether this is an opens

Re: [SR-Users] why kamcmd tls.reload is not safe

2013-10-21 Thread Klaus Darilion
I remember that long time ago there was an email discussing the problem in details. MAybe it was on one of the old mailing lists (ser, openser). IIRC the feature and the detailed discussion way by Jan Janak. Maybe this helps you to refine your Google search. regards Klaus On 19.10.2013 21:33

[SR-Users] why kamcmd tls.reload is not safe

2013-10-19 Thread Ding Ma
In the current Kamailio TLS module document, there is a statement about tls.reload being unsafe. But the only way to periodically update CRL without restarting Kamailio is to use tls.reload. In our test with tls.reload for CRL, it seems Kamailio would crash after about 100 times of tls.reload i