Starting from Sippy2021 the UI to setup TLS traffic processing was implemented. In order to use this feature, the version of OpenSIPS used for Environment should be >=3.1


More basic information regarding TLS could be found in Wikipedia for example.

Note, setup of Authentication and Termination in Sippy is out of scope of this documentation. If needed, check System Concepts section, e.g. https://support.sippysoft.com/a/solutions/articles/77553


Authorization of incoming TLS calls

In order to authenticate the TLS traffic it's required to assign the TLS certificate with the required TLS method to selected Network Listener (IP:port) on Incoming SIP TLS Connections page:

By default 5061 TCP port and all IP addresses assigned to Environment accept incoming traffic.

All external TLS communication within Environment is allowed only from OpenSIPS ports, it's not possible to send outgoing INVITE with TLS from port of b2bua.


1. Make sure that IP address of traffic originator is allowed on System Management - System Parameters - IP Firewall in SIP/TLS section:

2. Then add the new TLS certificate from System Management - System Parameters - SSL Certificates. 

Note - certificate should be valid, expired certificate can not be used to establish TLS connection.

3. Now setup the added certificate in System Management - System Parameters - Incoming SIP TLS Connections


4. Changes would be applied in about a minute - after that the test call could be sent through this vendor.

5. Sippy Softswitch demands the CA certificate from the caller so it should be configured on caller's end.




Termination the outgoing call to Vendor via TLS 

1. Make sure that IP address of traffic receiver (Vendor) is allowed on System Management - System Parameters - IP Firewall in SIP/TLS section:

 

2. Then add the new TLS certificate from System Management - System Parameters - SSL Certificates. 

Note - certificate should be valid, expired certificate can not be used to establish TLS connection.


3. An optional CA list could be added with root certificate that is chained with previously added SSL certificate. It is used to perform additional verification of SSL certificate of vendor with certificate of CA Authority that is trusted. Addition is performed from System Management - System Parameters - CA Lists.


4. Now open Vendors - My Vendors - Vendors page, choose needed Vendor and click Open Connections button, then either create new Connection or adjust existing:


5. Set Protocol = SIP/TLS, press Save and Close to get back to list of Connections:



6. Choose SIP TLS Options from Advanced Preferences of Connection:


7. Specify the SSL Certificate added in 2nd step, CA List if needed and choose needed TLS Method


8. Changes would be applied in about a minute - after that the test call could be sent through this vendor.


Scenario with Registered UA

In >=2021 version a new setting was added to the menu - System Vendor - System Connection - SIP TLS Options

It allows to setup the Certificate, CA list and TLS Method for System vendor-System connection that are used in scenario with Registered UA. This is Environment-wide setting available under System Management - System Parameters.


Example of generation of TLS root certificate (CA list), client certificate and key

$ mkdir /var/tmp/123
$ cd /var/tmp/123
$ /usr/local/bin/openssl req -x509 -sha256 -days 356 -nodes -newkey rsa:2048 -subj "/CN=test.domain.com/C=US/L=San Fransisco" -keyout ca_test.domain.com.key -out ca_test.domain.com.crt
Generating a RSA private key
.................................................+++++
...+++++
writing new private key to 'ca_test.domain.com.key'
-----
$ /usr/local/bin/openssl genrsa -out server.key 2048
Generating RSA private key, 2048 bit long modulus (2 primes)
...........................+++++
..............+++++
e is 65537 (0x010001)
$ cat > csr.conf <<EOF
[ req ]
default_bits = 2048
prompt = no
default_md = sha256
req_extensions = req_ext
distinguished_name = dn

[ dn ]
C = US
ST = California
L = San Fransisco
O = TestHub
OU = TestHub Dev
CN = test.domain.com

[ req_ext ]
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = test.domain.com
DNS.2 = www.test.domain.com

EOF
$ /usr/local/bin/openssl req -new -key server.key -out server.csr -config csr.conf
$ cat > cert.conf <<EOF

authorityKeyIdentifier=keyid,issuer
basicConstraints=CA:FALSE
keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
subjectAltName = @alt_names

[alt_names]
DNS.1 = test.domain.com

EOF
$ /usr/local/bin/openssl x509 -req -in server.csr -CA ca_test.domain.com.crt -CAkey ca_test.domain.com.key -CAcreateserial -out server.crt -days 365 -sha256 -extfile cert.conf
Signature ok
subject=C = US, ST = California, L = San Fransisco, O = TestHub, OU = TestHub Dev, CN = test.domain.com
Getting CA Private Key
$ ls
ca_test.domain.com.crt  ca_test.domain.com.srl  csr.conf                server.csr
ca_test.domain.com.key  cert.conf               server.crt              server.key

After following the steps above ca_test.domain.com.crt should be added to CA lists while server.crt and server.key should be added to SSL Certificates

SSL Certificate entity and CA list entity later could be used in TLS setup as suggested above.