Commit Graph

11 Commits

Author SHA1 Message Date
Dragos Oancea 8e59603d98 [core][mod_sofia] remove ZRTP (deemed obsolete).
[unit-tests][build-system][docs] remove references to ZRTP.
2022-10-28 20:19:42 +03:00
Alexander Traud d7c68893cc
[configuration] Copy TLS ciphers from vars.xml even in Vanilla External
Previously, the configuration file vars.xml set the TLS Cipher Suites only for internal SIP profiles. External SIP profiles used the 'DEFAULT' set of the underlying OpenSSL. Now, external SIP profiles copy to the general setting of vars.xml as well. Of course, you can overwrite this anytime, for example, to use different sets for internal and external.
2020-10-16 15:32:48 +02:00
上海宁卫信息技术有限公司 ae0444e9cb
[Configuration] sip_profiles: Use $${external_sip_ip} for ext-sip-ip, $${external_rtp_ip} for ext-rtp-ip 2020-04-06 00:02:48 +04:00
Andrey Volk a5cecbfc2a FS-11604: [Configuration] Improve Vanilla config. 2019-05-21 00:03:14 +04:00
Travis Cross 1d726c1d91 Fix docs on enabling cert CN/SAN validation
The correct incantations to enable certification common name / subject
alternative name verification, per our code, are `subjects_all`,
`subjects_in`, and `subjects_out` in a Sofia profile's
`tls-verify-policy`.  What we've had in our examples and documentation
for years are `all_subjects`, `in_subjects`, and `out_subjects`.

The result of this is that we've almost certainly confused people into
using the incorrect forms.  Those poor people will believe that they
are verifying the CN/SAN of the received host certificate against the
list in `tls-verify-in-subjects` when in fact they are not.

One clear issue in this case was that the incorrect forms failed to
have any effect without providing any warning or error.  This issue
could not have persisted if we had made more noise about incorrect
input.

Given how long this has been broken, it's tempting to alias the
incorrect forms to the correct ones.  However this would certainly
break many existing installations that have, because of this error,
never actually tested their setup with CN/SAN validation enabled.

In this commit, we fix the examples and documentation, and add an
error-level log output when unknown values are passed to
`tls-verify-policy`.

Thanks-to: Andrew Patrikalakis <anrp+freeswitch@anrp.net>
2015-06-17 17:10:29 +00:00
Anthony Minessale 68055eab2b support tls dir options properly 2013-03-31 21:27:26 -05:00
Travis Cross c6aa2f14ec add config comments about zrtp-passthru and late negotiation 2012-06-01 21:27:33 +00:00
Travis Cross c6b523c65f add inbound-zrtp-passthru to sample configs 2012-05-27 05:58:12 +00:00
Travis Cross 8513be49de enable inbound-late-negotiation in sample configs
We often tell people to enable this for various reasons; it likely
makes a sensible default.
2012-05-27 05:50:47 +00:00
Travis Cross 73614127fc whitespace cleanup 2012-05-27 05:44:14 +00:00
Ken Rice ee71daa1f6 conf: mv conf/* -> conf/vanilla/* 2012-03-24 03:19:32 +00:00