[asterisk-users] OpenVPN tunnel and one-way audio - Do I still need a SIP proxy? (bruce bruce)

bruce bruce bruceb444 at gmail.com
Thu Sep 23 18:36:21 CDT 2010


Thanks for the detailed info. Problem was solved by including Server B
subnet as the localnet of the Server A (OpenVPN server) and setting each
extension NAT=NO.

Your points are good guides for future problem diagnoses.

Thanks again,
Bruce

On Thu, Sep 23, 2010 at 1:56 PM, Dave Platt <dplatt at radagast.org> wrote:

>
> > I don't think it's an endpoint issue. I think the SIP packet headers get
> > over-written by the tunnel (openvpn) protocol.
>
> I'd be rather astonished if OpenVPN itself were responsible for this.
> As far as I know, OpenVPN doesn't do higher-level-protocol rewriting
> of any sort.  It just provides the "bit pipe" through the tunnel.
>
> I'd suggest several other possible culprits:
>
> (1) Server B might be doing higher-level protocol rewriting (i.e.
>    SIP border gateway stuff) prior to routing the SIP packets
>    through the OpenVPN tunnel.
>
>    This might happen if Server B were configured to use the
>    Linux "iptables" features, with a SIP protocol module and
>    Network Address Translation features.
>
>    The fix would be to disable NAT and boundary processing in
>    Server B's routing functions.
>
> (2) The SIP endpoints (phones) might be configured to "discover
>    their external address", via STUN or a similar mechanism.
>
>    The fix would be to change the endpoint device configuration.
>
> I think you'll need to use Wireshark or a similar sniffer, to see
> what the SIP traffic looks like at several points along the path,
> so you can locate the earliest point at which the wrong address is
> in the SIP packet payload.
>
> Several examination points come to mind:
>
> -  Right after the packet leaves the endpoint device.  I'd suggest
>   using a laptop running Wireshark as a passive packet sniffer...
>   connect the endpoint device and the laptop to an Ethernet hub
>   (not a switch!) and sniff the packets before any router gets
>   its hands on them.
>
> -  As the packets enter Server B - use Wireshark on Server B and
>   have it tap into the incoming Ethernet interface.
>
> -  As the packets are pushed out of Server B's routing layer into
>   the OpenVPN tunnel.  Use Wireshark to monitor the "tap" or
>   "tun" virtual interface, to which the kernel transmits the packets
>   that OpenVPN is to convey.
>
> -  As the packets come out of the tap/tun device on Server A.
>
> In scenario (1) I described above, you'd see the packets be correct
> at the first and second Wireshark sniffing points, and incorrect at the
> third and fourth (i.e. the modifications are being performed in
> Server B's routing/NAT'ing layer).
>
> In Scenario (2), they'd be incorrect at every point, including just
> after they come out of the IP-phone.
>
> In the scenario you described, they'd be correct at the first, second,
> and third points, and wrong at the fourth.
>
>
> --
> _____________________________________________________________________
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
> New to Asterisk? Join us for a live introductory webinar every Thurs:
>               http://www.asterisk.org/hello
>
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
>   http://lists.digium.com/mailman/listinfo/asterisk-users
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20100923/dee08bc8/attachment.htm 


More information about the asterisk-users mailing list