TCP Error Messages Using TLS 1.8.2

Paul
2013-02-02
2013-05-09
  • Paul

    Paul - 2013-02-02

    Feb  1 23:43:48 sip /usr/local/sbin/opensips[24865]: SEND OUT TO ASTERISK GATEWAY (PSTN) time=Fri Feb  1 23:43:48 2013 method=INVITE r-uri=sip:3333333333@sip.mydomain.net F=sip:8000@sip.mydomain.net IP=111.111.111.111 ID=1630408894@172.16.1.92
    Feb  1 23:43:48 sip /usr/local/sbin/opensips[24865]: Selected PSTN trunk ruri=sip:3333333333@sip.mydomain.net/du=sip:sip.mydomain.net:5065
    Feb  1 23:43:48 sip /usr/local/sbin/opensips[24865]: NEW branch_route[2] method=INVITE RURI=sip:3333333333@sip.mydomain.net | FROM=8000 | IP=111.111.111.111
    Feb  1 23:43:48 sip /usr/local/sbin/opensips[24866]: incoming reply
    Feb  1 23:43:48 sip rtpproxy[8909]: INFO:handle_command: new session 01d0835d17529a062342cde926cd41e7@222.222.222.222:5065, tag as1a4ecc97;1 requested, type strong
    Feb  1 23:43:48 sip rtpproxy[8909]: INFO:handle_command: new session on a port 27280 created, tag as1a4ecc97;1
    Feb  1 23:43:48 sip rtpproxy[8909]: INFO:handle_command: pre-filling caller's address with 222.222.222.222:19512
    Feb  1 23:43:48 sip /usr/local/sbin/opensips[24864]: NEW branch_route[2] method=INVITE RURI=sip:9000@111.111.111.111:44971;transport=TLS;ob | FROM=18885554444 | IP=222.222.222.222
    Feb  1 23:43:48 sip /usr/local/sbin/opensips[24864]: NEW branch_route[2] method=INVITE RURI=sip:9000@111.111.111.111:46694;transport=TLS;ob | FROM=18885554444 | IP=222.222.222.222
    Feb  1 23:43:48 sip kernel: RULE 48 -- DENY IN= OUT=eth0 SRC=222.222.222.222 DST=111.111.111.111 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=17471 DF PROTO=TCP SPT=45447 DPT=44971 WINDOW=5840 RES=0x00 SYN URGP=0
    Feb  1 23:43:48 sip /usr/local/sbin/opensips[24864]: INFO:core:probe_max_sock_buff: using snd buffer of 255 kb
    Feb  1 23:43:48 sip /usr/local/sbin/opensips[24864]: INFO:core:init_sock_keepalive: -- TCP keepalive enabled on socket
    Feb  1 23:43:51 sip kernel: RULE 48 -- DENY IN= OUT=eth0 SRC=222.222.222.222 DST=111.111.111.111 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=17472 DF PROTO=TCP SPT=45447 DPT=44971 WINDOW=5840 RES=0x00 SYN URGP=0
    Feb  1 23:43:57 sip kernel: RULE 48 -- DENY IN= OUT=eth0 SRC=222.222.222.222 DST=111.111.111.111 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=17473 DF PROTO=TCP SPT=45447 DPT=44971 WINDOW=5840 RES=0x00 SYN URGP=0
    Feb  1 23:43:58 sip /usr/local/sbin/opensips[24864]: ERROR:core:tcp_blocking_connect: timeout 10 s elapsed from 10 s
    Feb  1 23:43:58 sip /usr/local/sbin/opensips[24864]: ERROR:core:tcpconn_connect: tcp_blocking_connect failed
    Feb  1 23:43:58 sip /usr/local/sbin/opensips[24864]: ERROR:core:tcp_send: connect failed
    Feb  1 23:43:58 sip /usr/local/sbin/opensips[24864]: ERROR:tm:msg_send: tcp_send failed
    Feb  1 23:43:58 sip /usr/local/sbin/opensips[24864]: ERROR:tm:t_forward_nonack: sending request failed
    Feb  1 23:43:58 sip /usr/local/sbin/opensips[24876]: incoming reply
    Feb  1 23:43:58 sip /usr/local/sbin/opensips[24876]: incoming reply
    Feb  1 23:43:58 sip /usr/local/sbin/opensips[24867]: incoming reply
    Feb  1 23:44:02 sip rtpproxy[8909]: INFO:handle_command: lookup on ports 27280/27742, session timer restarted
    Feb  1 23:44:02 sip rtpproxy[8909]: INFO:handle_command: pre-filling callee's address with 111.111.111.111:4000
    Feb  1 23:44:02 sip /usr/local/sbin/opensips[24876]: incoming reply
    Feb  1 23:44:02 sip /usr/local/sbin/opensips[24866]: incoming reply
    Feb  1 23:44:02 sip /usr/local/sbin/opensips[24866]: ACC: transaction answered: timestamp=1359762242;method=INVITE;from_tag=1850195807;to_tag=as1745df4a;call_id=1630408894@172.16.1.92;code=200;reason=OK
    Feb  1 23:44:02 sip /usr/local/sbin/opensips[24876]: ACC: transaction answered: timestamp=1359762242;method=INVITE;from_tag=as1a4ecc97;to_tag=Ezp3gyuXDj-VywNbURfkxWYN8sufFk.p;call_id=01d0835d17529a062342cde926cd41e7@222.222.222.222:5065;code=200;reason=OK
    Feb  1 23:44:15 sip /usr/local/sbin/opensips[24867]: ACC: transaction answered: timestamp=1359762255;method=BYE;from_tag=1850195807;to_tag=as1745df4a;call_id=1630408894@172.16.1.92;code=200;reason=OK
    Feb  1 23:44:15 sip rtpproxy[8909]: INFO:handle_delete: forcefully deleting session 1 on ports 27280/27742
    Feb  1 23:44:15 sip rtpproxy[8909]: INFO:remove_session: RTP stats: 693 in from callee, 648 in from caller, 1341 relayed, 0 dropped
    Feb  1 23:44:15 sip rtpproxy[8909]: INFO:remove_session: RTCP stats: 4 in from callee, 2 in from caller, 6 relayed, 0 dropped
    Feb  1 23:44:15 sip rtpproxy[8909]: INFO:remove_session: session on ports 27280/27742 is cleaned up
    Feb  1 23:44:15 sip /usr/local/sbin/opensips[24876]: ACC: transaction answered: timestamp=1359762255;method=BYE;from_tag=as1a4ecc97;to_tag=Ezp3gyuXDj-VywNbURfkxWYN8sufFk.p;call_id=01d0835d17529a062342cde926cd41e7@222.222.222.222:5065;code=200;reason=OK

    How to set this up:
    Opensips listening UDP 5060, TCP 5060, TLS 5061

    8000 registerd to proxy UDP (callerID 18885554444)
    9000 registerd to proxy TLS (DID 3333333333)

    Both UAC's in the WAN

    8000 calls the DID "3333333333" associated with 9000

    Opensips relays the call to asterisk.

    Asterisk/billing Application recognizes the DID and routes it back to opensips as local call and the errors appear.  

     
  • Paul

    Paul - 2013-02-02

    TCP Blocking message due to firewall restrictions at/near line 11. Opensips select a high TCP source port to transmit. TCPp signaling port defined in the config (5060) is allowd outbound in firewall rules. The call was successful but it was about 10 seconds of delay before ringing started. How can you determine what TCP ports opensips will use? Do not want to open a large number of outboud TCP ports.

     
  • Paul

    Paul - 2013-02-03

    SOLVED: Used the latest svn (9727) release of 1.8.2

     

Get latest updates about Open Source Projects, Conferences and News.

Sign up for the SourceForge newsletter:





No, thanks