[SR-Users] Wildcard TLS

Klaus Darilion klaus.mailinglists at pernau.at
Wed May 25 15:15:35 CEST 2011


Inaki - are there any SIP implementations which implemented RFC 5922? I
suspect also Kamailio is not conform.

regards
Klaus

Am 25.05.2011 13:29, schrieb Iñaki Baz Castillo:
> 2011/5/24 Jon Farmer <viperdudeuk at gmail.com>:
>> I want to start offering TLS on a per customer basis. However I don't
>> want to have to create a TLS certificate per customer if I don't need
>> to. So I need to know if I can create a *.example.org certificate and
>> use that for all customers who want TLS?
> 
> Hi Jon, please check RFC 5922 "Domain Certificates in the Session
> Initiation Protocol (SIP)" as you don't need a TLS certificate for
> each domain you server (this is a common misunderstanding):
> 
> 
> 7.3.  Client Behavior
> 
>    A client uses the domain portion of the SIP AUS to query a (possibly
>    untrusted) DNS to obtain a result set, which is one or more SRV and A
>    records identifying the server for the domain (see Section 4 for an
>    overview).
> 
>    The SIP server, when establishing a TLS connection, presents its
>    certificate to the client for authentication.  The client MUST
>    determine the SIP domain identities in the server certificate using
>    the procedure in Section 7.1.  Then, the client MUST compare the
>    original domain portion of the SIP AUS used as input to the RFC 3263
>    [8] server location procedures to the SIP domain identities obtained
>    from the certificate.
> 
> 
> 7.1.  Finding SIP Identities in a Certificate
> 
>    Implementations (both clients and server) MUST determine the validity
>    of a certificate by following the procedures described in RFC 5280
>    [6].
> 
>    [...]
> 
>    Given an X.509 certificate that the above checks have found to be
>    acceptable, the following describes how to determine what SIP domain
>    identity or identities the certificate contains.  A single
>    certificate can serve more than one purpose -- that is, the
>    certificate might contain identities not acceptable as SIP, domain
>    identities and/or might contain one or more identities that are
>    acceptable for use as SIP domain identities.
> 
>    1.  Examine each value in the subjectAltName field.  The
>        subjectAltName field and the constraints on its values are
>        defined in Section 4.2.1.6 of RFC 5280 [6].  The subjectAltName
>        field can be absent or can contain one or more values.
> 
>        [...]
> 
>    2.  If and only if the subjectAltName does not appear in the
>        certificate, the implementation MAY examine the CN field of the
>        certificate.  If a valid DNS name is found there, the
>        implementation MAY accept this value as a SIP domain identity.
>        Accepting a DNS name in the CN value is allowed for backward
>        compatibility, but when constructing new certificates, consider
>        the advantages of using the subjectAltName extension field (see
>        Section 6).
> 
> 
> 6.  Certificate Usage by a SIP Service Provider
> 
>    It is possible for service providers to continue the practice of
>    using existing certificates for SIP usage with the identity conveyed
>    only in the Subject field, but they should carefully consider the
>    following advantages of conveying identity in the subjectAltName
>    extension field:
> 
>    o  The subjectAltName extension can hold multiple values, so the same
>       certificate can identify multiple servers or sip domains.
> 
>    o  There is no fixed syntax specified for the Subject field, so
>       issuers vary in how the field content is set.  This forces a
>       recipient to use heuristics to extract the identity, again
>       increasing opportunities for misinterpretation.
> 
> 



More information about the sr-users mailing list