I found that my TLS client was not happy because my server cert is
signed by an intermediate root.

A quick search in Google found other people mentioning the same problem,
but no solution or documentation.

I've had a quick look in the Kamailio source and I notice it is using
the call:

        SSL_CTX_use_certificate_chain_file

to load the certificate specified in tls.cfg with

certificate=myserver.pem

In practice, this means the intermediate certificates can be appended to
myserver.pem and Kamailio will present them to the TLS client:

Example:

Trust heirarchy:

trusted root
  - inter 1
       - inter 2
             - server.example.com.pem

Construct the PEM file in this exact order:

cat server.example.com.pem > chain-server.example.com.pem
cat inter2.pem >> chain-server.example.com.pem
cat inter1.pem >> chain-server.example.com.pem

and then, in tls.cfg:

certificate=chain-server.example.com.pem



_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to