Page 1 of 1

Vicibox 7 webphone DTLS error after chrome update

PostPosted: Wed May 19, 2021 5:06 am
by rustynail
Hi experts and William/Florell,

We have lots of servers and clusters running with vicbox 7.0.4 since long. All were working good with PBXwebphone by Taras Chornyi till google chrome was updated and webphone stopped working. Below error was reported on asterisk cli whenever an agent was logged in with webphone.

[May 19 10:03:57] ERROR[15162][C-00000002]: res_rtp_asterisk.c:2166 __rtp_recvfrom: DTLS failure occurred on RTP instance '0x7f77f0010348' due to reason 'tlsv1 alert protocol version', terminating
[May 19 10:03:57] WARNING[15162][C-00000002]: res_rtp_asterisk.c:3877 ast_rtcp_read: RTCP Read error: Unspecified. Hanging up.
[May 19 10:03:57] -- Hungup 'DAHDI/pseudo-520098707'

I did some research and found it is due to old version of openssl (openssl-1.0.1i-21.1.x86_64) which I tried to update but due to OS limitations probably, I was not successful with this. We are now using latest version on new servers but as we have many servers with vicibox 7 (100+) running in production so its not feasible to upgrade all to new version.

I was thinking if there is any workaround/patch to make webphone work on same vicibox 7 version?

Any help or guidance in this regard will be highly appreciated.

Thanks.

Re: Vicibox 7 webphone DTLS error after chrome update

PostPosted: Wed May 19, 2021 7:03 am
by carpenox
unfortunately there is not, you MUST update openssl in order to continue using webphone, you could try the viciphone 2.1 on christians github but thats still going to require newer openssl.

Re: Vicibox 7 webphone DTLS error after chrome update

PostPosted: Wed May 19, 2021 8:14 am
by GenXOutsourcing
I made this work with Goautodial, you might try it.

look for method = TLSv1 and change it to method = TLSv1+

Re: Vicibox 7 webphone DTLS error after chrome update

PostPosted: Wed May 19, 2021 10:13 am
by rustynail
Hi,

Thank you both for your valuable feedback.

GenXOutsourcing cab you please shed some more light on how to use TLSv1+ and where does it need to make changes?

Cheers