[asterisk-commits] jamesgolovich: branch group/sip-tcptls r92241 - /team/group/sip-tcptls/doc/

SVN commits to the Asterisk project asterisk-commits at lists.digium.com
Mon Dec 10 13:01:30 CST 2007


Author: jamesgolovich
Date: Mon Dec 10 13:01:30 2007
New Revision: 92241

URL: http://svn.digium.com/view/asterisk?view=rev&rev=92241
Log:
Add some basic TLS documentation


Added:
    team/group/sip-tcptls/doc/siptls.txt   (with props)

Added: team/group/sip-tcptls/doc/siptls.txt
URL: http://svn.digium.com/view/asterisk/team/group/sip-tcptls/doc/siptls.txt?view=auto&rev=92241
==============================================================================
--- team/group/sip-tcptls/doc/siptls.txt (added)
+++ team/group/sip-tcptls/doc/siptls.txt Mon Dec 10 13:01:30 2007
@@ -1,0 +1,88 @@
+Asterisk SIP/TLS Transport
+==========================
+
+When using TLS the client will typically check the validity of the
+certificate chain.  So that means you either need a certificate that is
+signed by one of the larger CAs, or if you use a self signed certificate
+you must install a copy of your CA on the client.
+
+So far this code has been test with:
+Polycom Soundpoint IP Phones (TLS and TCP)
+Minisip Softphone (TLS and TCP)
+Cisco IOS Gateways (TCP only)
+
+sip.conf options
+----------------
+tlsenable=[yes|no]
+	Enable TLS server, default is no
+
+tlsbindaddr=<ip address>
+	Specify IP address to bind TLS server to, default is 0.0.0.0
+
+tlscertfile=</path/to/certificate>
+	The server's certificate file.  Should include the key and 
+	certificate.  This is mandatory if your going to run a TLS server.
+
+tlscafile=</path/to/certificate>
+	If the server your connecting to uses a self signed certificate
+	you should have their certificate installed here so the code can 
+	verify the authenticity of their certificate.
+
+tlscadir=</path/to/ca/dir>
+	A directory full of CA certificates.  The files must be named with 
+	the CA subject name hash value. 
+	(see man SSL_CTX_load_verify_locations for more info) 
+
+tlsdontverifyserver=[yes|no]
+	If set to yes, don't verify the servers certificate when acting as 
+	a client.  If you don't have the server's CA certificate you can
+	set this and it will connect without requiring tlscafile to be set.
+	Default is no.
+
+tlscipher=<SSL cipher string>
+	A string specifying which SSL ciphers to use or not use
+
+
+Sample config
+-------------
+
+Here are the relevant bits of config for setting up TLS between 2
+asterisk servers.  With server_a registering to server_b
+
+On server_a:
+[general]
+tlsenable=yes
+tlscertfgile=/etc/asterisk/asterisk.pem
+tlscafile=/etc/ssl/ca.pem  ; This is the CA file used to generate both certificates
+register => tls://100:test@192.168.0.100:5061
+
+[101]
+type=friend
+context=internal
+host=192.168.0.100 ; The host should be either IP or hostname and should 
+                   ; match the 'common name' field in the servers certificate
+secret=test
+dtmfmode=rfc2833
+disallow=all
+allow=ulaw
+transport=tls 
+port=5061
+
+On server_b:
+[general]
+tlsenable=yes
+tlscertfgile=/etc/asterisk/asterisk.pem
+
+[100]
+type=friend
+context=internal
+host=dynamic
+secret=test
+dtmfmode=rfc2833
+disallow=all
+allow=ulaw
+;You can specify transport= and port=5061 for TLS, but its not necessary in
+;the server configuration, any type of SIP transport will work
+;transport=tls 
+;port=5061
+

Propchange: team/group/sip-tcptls/doc/siptls.txt
------------------------------------------------------------------------------
    svn:eol-style = native

Propchange: team/group/sip-tcptls/doc/siptls.txt
------------------------------------------------------------------------------
    svn:keywords = Author Date Id Revision

Propchange: team/group/sip-tcptls/doc/siptls.txt
------------------------------------------------------------------------------
    svn:mime-type = text/plain




More information about the asterisk-commits mailing list