Dear all, I am trying to configure websockets for kamailio IMS. My basic kamailio(without IMS) setup works properly with websockets and without websockets. The IMS functionality also works, but only with IMS clients and now I want to use webrtc clients and make calls. At the moment I am trying to add the websockets support to the pcscf. I have did some changes to the pcscf cfg file.
My problem is not really related to the cfg of pcscf as the component is listening for tcp/tls connections, but I cannot connect through the assigned ports. The output of the pcscf component and the the wireshark pcap file for the Websocket are attached. (I basically tried to browse http://server.ip.address:tcp.port or https://server.ip:tls.port without using a webrtc client yet). 192.168.0.10 -> host 192.168.0.11 -> virtual machine running kamailio Thanks in advance, Serhat
Listening on udp: server.net1.test [192.168.0.11]:4060 tcp: 192.168.0.11 [192.168.0.11]:880 tcp: server.net1.test [192.168.0.11]:4060 tls: 192.168.0.11 [192.168.0.11]:4443 tls: server.net1.test [192.168.0.11]:5061 Aliases: *: pcscf.net1.test:* WARNING: no fork mode 0(1537) INFO: <core> [tcp_main.c:4665]: init_tcp(): using epoll_lt as the io watch method (auto detected) 0(1537) INFO: rr [../outbound/api.h:54]: ob_load_api(): unable to import bind_ob - maybe module is not loaded 0(1537) INFO: rr [rr_mod.c:174]: mod_init(): outbound module not available 0(1537) INFO: ims_usrloc_pcscf [hslot.c:62]: ul_init_locks(): locks array size 512 0(1537) INFO: tls [tls_mod.c:362]: mod_init(): With ECDH-Support! 0(1537) INFO: tls [tls_mod.c:365]: mod_init(): With Diffie Hellman 0(1537) INFO: tls [tls_init.c:593]: init_tls_h(): tls: _init_tls_h: compiled with openssl version "OpenSSL 1.0.1t 3 May 2016" (0x1000114f), kerberos support: off, compression: on 0(1537) INFO: tls [tls_init.c:601]: init_tls_h(): tls: init_tls_h: installed openssl library version "OpenSSL 1.0.1t 3 May 2016" (0x1000114f), kerberos support: off, zlib compression: off compiler: gcc -I. -I.. -I../include -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector-strong -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-z,relro -Wa,--noexecstack -Wall -march=i686 -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 0(1537) WARNING: tls [tls_init.c:655]: init_tls_h(): tls: openssl bug #1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls operations will fail preemptively) with free memory thresholds 8388608 and 4194304 bytes 0(1537) INFO: <core> [cfg/cfg_ctx.c:608]: cfg_set_now(): INFO: cfg_set_now(): tls.low_mem_threshold1 has been changed to 8388608 0(1537) INFO: <core> [cfg/cfg_ctx.c:608]: cfg_set_now(): INFO: cfg_set_now(): tls.low_mem_threshold2 has been changed to 4194304 0(1537) INFO: <core> [udp_server.c:150]: probe_max_receive_buffer(): SO_RCVBUF is initially 163840 0(1537) INFO: <core> [udp_server.c:200]: probe_max_receive_buffer(): SO_RCVBUF is finally 327680 0(1537) INFO: tls [tls_domain.c:276]: fill_missing(): TLSs<default>: tls_method=3 0(1537) INFO: tls [tls_domain.c:288]: fill_missing(): TLSs<default>: certificate='/usr/local/etc/kamailio/kamailio-selfsigned.pem' 0(1537) INFO: tls [tls_domain.c:295]: fill_missing(): TLSs<default>: ca_list='/usr/local/src/kamailio-4.3/kamailio/etc/tls/rootCA/cacert.pem' 0(1537) INFO: tls [tls_domain.c:302]: fill_missing(): TLSs<default>: crl='(null)' 0(1537) INFO: tls [tls_domain.c:306]: fill_missing(): TLSs<default>: require_certificate=0 0(1537) INFO: tls [tls_domain.c:313]: fill_missing(): TLSs<default>: cipher_list='(null)' 0(1537) INFO: tls [tls_domain.c:320]: fill_missing(): TLSs<default>: private_key='/usr/local/etc/kamailio/kamailio-selfsigned.key' 0(1537) INFO: tls [tls_domain.c:324]: fill_missing(): TLSs<default>: verify_certificate=0 0(1537) INFO: tls [tls_domain.c:327]: fill_missing(): TLSs<default>: verify_depth=9 0(1537) INFO: tls [tls_domain.c:671]: set_verification(): TLSs<default>: No client certificate required and no checks performed 0(1537) INFO: tls [tls_domain.c:276]: fill_missing(): TLSc<default>: tls_method=12 0(1537) INFO: tls [tls_domain.c:288]: fill_missing(): TLSc<default>: certificate='(null)' 0(1537) INFO: tls [tls_domain.c:295]: fill_missing(): TLSc<default>: ca_list='(null)' 0(1537) INFO: tls [tls_domain.c:302]: fill_missing(): TLSc<default>: crl='(null)' 0(1537) INFO: tls [tls_domain.c:306]: fill_missing(): TLSc<default>: require_certificate=1 0(1537) INFO: tls [tls_domain.c:313]: fill_missing(): TLSc<default>: cipher_list='(null)' 0(1537) INFO: tls [tls_domain.c:320]: fill_missing(): TLSc<default>: private_key='(null)' 0(1537) INFO: tls [tls_domain.c:324]: fill_missing(): TLSc<default>: verify_certificate=1 0(1537) INFO: tls [tls_domain.c:327]: fill_missing(): TLSc<default>: verify_depth=9 0(1537) INFO: tls [tls_domain.c:656]: set_verification(): TLSc<default>: Server MUST present valid certificate 0(1537) WARNING: ims_usrloc_pcscf [usrloc_db.c:59]: connect_db(): DB connection already open... continuing 3(1541) WARNING: ims_usrloc_pcscf [usrloc_db.c:59]: connect_db(): DB connection already open... continuing
tcp_fail.pcap
Description: Binary data
_______________________________________________ SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users