[Serusers] cancelling forked requests + forcing TLS use
Andrew T Gin
atg19 at student.canterbury.ac.nz
Wed Mar 7 00:57:59 CET 2007
Hi
I have two questions.
1. Receiver at 1.1.1.1 and Receiver at 2.2.2.2 register with ser.
Client sends an INVITE to ser for Receiver.
ser forks these INVITES in parallel to both Receiver at 1.1.1.1 and
Receiver at 2.2.2.2.
As both Receivers are online, they both reply with 200 OK.
SER then relays BOTH 200 OK's back to the Client.
My question: Shouldn't SER send CANCEL to one of the receivers, and
relay only ONE 200 OK back to the client? How would I do this?
It is not the client's responsibility to send a CANCEL to the SER to
relay to one of the receivers, is this correct? This is because the
client only sent one invite, therefore it should only receive one OK. ie
should SER 'shield' the client from the knowledge of the existence of
multiple contact addresses?
2. When I have
tls_verify_client = 1
tls_require_client_certificate = 1
in my cfg file, ser still accepts tcp and udp connections, despite
tls_require_client_certificate=1. I did a search, and found this way:
if (proto != TLS) {
sl_send_reply("403", "Forbidden");
exit;
};
However SER is really still listening on UDP and TCP port 5060. Is there
a way to configure SER such that it only listens and acknowledges TLS
connections?
Thanks
Andrew
More information about the sr-users
mailing list