And am using my sip peers with TLS and reception method same as the docuement.
[malcolm]
type=peer
secret=somepasword ;note that this is NOT a secure password
host=dynamic
context=local
dtmfmode=rfc2833
disallow=all
allow=g722
transport=tls
encryption=yes
context=local
But my softphone (I use Blink and Zoiper, Counterpath) connects to the server without any client certificate. I dont think this is how it suppose to work. But I see this label in my softphone saying that I use tls as transport, and I can make calls.
I dont even see “tlsverifyclient” in the config sample for a sip. I think this is only a pjsip thing, and unfortunately, I can’t quickly migrate to pjsip.
Is this the right way of SIP Over TLS work ? Or is there an option which am missing ?
why do we even need a client certificate if that is able to register without client certificate?
A client certificate is not required. It acts as a further identity such that only those who have been issued certificates are able to connect. Without a client certificate anyone can connect, but the connection is still encrypted.
But in this case, then do we really need to generate the Client certificate if we are no using it?
Also Is there any option where we can limit the based on the specific client certificate only ?
For example _ I have generated client.pem and clients file - The softphone needs to use those client certificates and then only it will get registered ,