Juha Heinanen writes:

> I just tried by replacing ca_list file of my proxy (that contained ca
> certs of my peers) with a single bogus ca cert.  Then I executed tls.cfg
> and made a call from one of the peers to my proxy.  My proxy still
> recognized the call as coming from the peer based on its tls common
> name.  My understanding is that this should not have been possible if
> the cached ca_list of my proxy would have been updated.

It turned out that the old tls connection from the peer to my proxy was
still alive.  After terminating the connection, a new connection setup
was correctly refused.

So looks like certs can be reloaded on the fly.  I'll try later with
client and server certs.

-- Juha

_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to