Thanks to those on IRC confirming quickly that this was not something supported
(yet) in Asterisk.
Below is a quick fix/patch to tcptls.c for Asterisk 18 against this particular
provider.
Dw
static int check_tcptls_cert_name(ASN1_STRING *cert_str, const char *hostname,
const char *desc)
{
unsigned char *str;
int ret;
ret = ASN1_STRING_to_UTF8(&str, cert_str);
if (ret < 0 || !str) {
return -1;
}
if (strlen((char *) str) != ret) {
ast_log(LOG_WARNING, "Invalid certificate %s length (contains
NULL bytes?)\n", desc);
ret = -1;
} else if (!strcasecmp(hostname, (char *) str)) {
ret = 0;
} else if (strlen(str) > 2 && str[0] == '*' && str[1] == '.' &&
strlen(str) - 2 <= strlen(hostname) &&
strcasecmp(hostname+strlen(hostname)-strlen(str)+2, str+2) == 0) {
ast_log(LOG_WARNING,"Warning: allowing match on wildcard (%s =~
%s)\n", hostname, str);
ret = 0;
} else {
ret = -1;
}
ast_debug(3, "SSL %s compare s1='%s' s2='%s'\n", desc, hostname, str);
OPENSSL_free(str);
return ret;
}
--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
Check out the new Asterisk community forum at: https://community.asterisk.org/
New to Asterisk? Start here:
https://wiki.asterisk.org/wiki/display/AST/Getting+Started
asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
http://lists.digium.com/mailman/listinfo/asterisk-users