With the new Google Chrome update, removing support for TLS1.0 and TLS1.1, we have had an issue come up concerning our WebRTC which uses the jsSIP client.
Our systems are build on Centos 6.6 and we use openssl 1.0.1e-fips - which supports TLS1.2. The Asterisk version we are using is: 13.19.1
We have ran SIP packet traces and can confirm the type was: DTLS1.0 coming from the Asterisk server
Thanks for the reply, One thing that I forgot to mention is that we use chan_sip for our sip stack. Moving to PJSip was more of a last resort. We have TLS1.2 working perfectly fine on Centos 7 servers with the same version/files/configuration which shows me that chan_sip does support TLS1.2. So Im confused at what would break this on Centos 6 servers.
This is referring to the DTLS version, not the TLS version used for transport. DTLS 1.2 was added into OpenSSL 1.0.2. Latest Chrome requires use of DTLS 1.2.