DO NOT SHARE THESE DOCS WITH CUSTOMERS!
This is an LA release that will only be provided to a select number of PLM-sanctioned customers (PDFs only). Contact PLM for details.
This release note describes new features, the latest hardware and software requirements, known limitations and other pertinent release information for the latest release of SBC Core.
Please note that all Ribbon bugs reported by customers on a given software release will be fixed in the latest release on that software release branch.
To view and download the latest End of Product Sale (EoPS) and other End Of Life (EOL) notices, navigate to the Resource Library on the corporate website (https://ribboncommunications.com/company/get-help/resource-library).
The SBC Core 11.00.0x documentation is located at the following Wiki space: SBC Core 11.0.x Documentation
Ribbon Release Notes are protected under the copyright laws of the United States of America. This work contains proprietary information of Ribbon Communications, Plano, TX-75023, USA. Use, disclosure, or reproduction in any form is strictly prohibited without prior authorization from Ribbon Communications.
The following Ribbon announcements (formerly known as WBAs) are referenced in this release note:
Bulletin ID | Description | Fixed in Release |
---|---|---|
Warning-17-00022689 | Duplicate Trunk Group or Zone names can cause unexpected behavior | 6.1.0 |
Warning-14-00020748 | Verify system and databases are fully in sync prior to Live Software Upgrade (LSWU). Applies to all SBC platforms (HW, SWe, Cloud) except the SBCs deployed in a Distributed SBC (D-SBC) architecture | N/A |
Warning-22-00030027 | Verify ESXi Version Prior Software Upgrade to 10.1.x or 9.2.3 | 9.2.3, 10.1.x |
To view/download Ribbon announcements, do the following:
For problems or questions, contact the Global Support Assistance Center:
Ribbon Support Portal: https://ribboncommunications.com/services/ribbon-support-portal
Voice: +1-833-RIBBON1 (1-833-742-2661)
The SBC Core platforms address the next-generation needs of SIP communications by delivering media transcoding, robust security and advanced call routing in a high-performance, 2RU, and 5RU form-factor devices enabling service providers and enterprises to quickly and securely enhance their network by implementing services like SIP trunking, secure Unified Communications and Voice over IP (VoIP).
For more product information, refer to the section About SBC Core in the main documentation space.
Unless explicitly specified, SBC Core features are not supported over GW. Please contact your Ribbon account team/channel partner for further details.
When using H.323-SIP and SIP-H.323 call flows, an additional Re-invite/Update may get generated towards the SIP side. To suppress this, enable the IP Signaling Profile (IPSP) flag Minimize Relaying Of Media Changes From Other Call Leg
at the SIP side.
H.323 is not supported on SBC SWe cloud deployments.
When upgrading your network, ensure to upgrade each product to the most current release to take advantage of the latest features, enhancements, and fixes.
For complete interoperability details between various Ribbon products, including backwards compatibility, refer to Ribbon Product Interoperability.
Refer to SBC Core Portfolio Interoperability Matrix for the latest and minimum compatible product versions supporting this release.
The following table lists and describes the new features in this release.
Issue ID | Description |
---|---|
SBX-90885 | Handling of RCD Passport Headers The SBC is enhanced to pass the "jcard" and the "call-reason" parameters received in the "Call-Info" header of the SIP INVITE to the PSX when STIR/SHAKEN is enabled.
For more information, refer to: |
SBX-96767 | PEM File Format Support for the Remote Type Certificate Currently, the SBC supports DER encoded files for type "remote" certificates. This feature implementation enhances the SBC to accept the PEM encoded files for "remote" certificates too. For more information, refer to: |
SBX-103594 | MSRP B2BUA Support when a=msrp-cema Present To support the SBC role as "MSRP B2BUA" (even though the SBC receives msrp-cema attribute in the SDP), the SBC is enhanced with a configuration flag msrpB2BUA in the Trunk Group. By default, this flag is disabled. For more information, refer to: |
SBX-104653 | Allow SMM Profile Index Gapping and Rearranging through CLI Use this feature to modify rules in SMM profiles using the rule index. This simplifies earlier procedures which required numerous manual steps. A CLI command is introduced to create a gap between the SMM rules and allow the user to add new rules in the gap without deleting the rules. For more information, refer to: |
SBX-105799 | Separate Partition for Logs in SBC For appliance platforms, three partitions exist due to image-based upgrades. The logs are on their partition separated from the application. For private and public cloud platforms, only one partition exists, and the logs are consequently in the root partition. Without a dedicated partition, the logs can fill up the disk space and severely impact the system's performance. This feature implementation ensures the logs are recorded in a separate logical partition. The SBC image (qcow2, vmdk) is built with a 35 GB disk. The disk is partitioned into two lvm partitions:
When installed on cloud OpenStack with an additional disk for logging:
A minimum of 35 GB of additional log disk size (if present) is needed for the SBC to start. The entire primary disk is used by the root partition while the additional disk is used for logging. For more information, refer to Dedicated Partition for Logs in SBC. |
SBX-106619 | Voice Analytics to Identify Voice Campaigns The SBC is enhanced to generate an audio fingerprint file on a sub-set of the calls identified for capture by SIPSG using the SAGE triggering algorithm. For calls where the audio fingerprint is computed, it is computed based on the incoming audio on the Ingress leg of the call. The audio fingerprinting is performed only for the calls where the Ingress leg is encoded using G.711 (A-law or μ-law), G.729AB, G.722, AMR, AMR-WB, EVRC, or EVRCB. For more information, refer to: |
SBX-106990 | To assist with graceful shutdown and other commands between the host and guest, KVM-based deployments of the SBC SWe support the QEMU guest agent. |
SBX-112688 | Upgrade procedures have been simplified by automating certain checks that previously required the operator to access the Linux shell during the upgrade procedure. For more information, refer to Pre-Upgrade Checklist - 7 Days Prior to Upgrade. |
SBX-113607 | Create an Ansible provisioning playbook for SBC Core SMM configuration can be provisioned on SBC using Ansible playbooks. Create, modify and delete of SMM configuration through Ansible can be done.
|
SBX-114021 | CIS: AppArmor Support on the SBC AppArmor is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. The AppArmor profiles can be in one of two modes: Enforcement or Complain. Profiles loaded in enforcement mode will result in enforcement of the policy defined in the profile as well as reporting policy violation attempts (either through syslog or auditd). Profiles in complain mode will not enforce policy but instead report policy violation attempts. Enabling AppArmor on the SBC, the SBC restricts the SM Process with a predefined profile. For more information, refer to: |
SBX-114117 | NWDL Support The SBC 7000, 5400 and SBC SWe are enhanced to support Network Wide-Domain Licensing (NWDL). For more information, refer to: |
To view features in previous releases, refer to the following release notes:
Beginning with Release 11.1, REST support will be deprecated in favor of RESTCONF.
For more information regarding CAM changes in 11.00.00R000, refer to CAM Changes in This Release.
To instantiate the SBC instances, use the following templates:
Example template files are packaged together in .tar.gz and .sha256 files separate from the SBC Core application installation and upgrade files:
The system hosting the SBC SWe Cloud must meet the below requirements.
The following SBC 5400 and SBC 7000 software and firmware versions are required for this release. For 5xx0, the BIOS is installed during application installation; whereas, for 5400 and 7000, the BMC/BIOS is included in the firmware package and installed during the firmware upgrade.
The SBC 51xx and SBC 52xx platforms are not supported from release 11.0.0 onwards. This release supports the SBC 5400, SBC 7000 and SBC SWe platforms.
In the table below, versions in blue font indicate changes since the previous supported release.
The SBC 51xx and SBC 52xx platforms are not supported from 11.0.0 software release onwards.
Platform | 11.0.0Rx |
---|---|
SBC 5400 | BMC: V03.23.00-R000 BIOS: V1.18.0 |
SBC 7000 | BMC: V03.23.00-R000 BIOS: V2.14.0 |
Use the EMA to verify the currently installed software and firmware versions.
Log on to the EMA, and from the main screen navigate to Monitoring > Dashboard > System and Software Info.
The following software release bundles are available for download from the Customer Portal:
Download the appropriate software packages for your desired configuration from the Customer Portal (https://ribboncommunications.com/services/ribbon-support-portal-login) to your PC:
When upgrading from release 9.0 and above, upload the SHA256 checksum file. Otherwise, use the MD5 file.
Execute the Method Of Procedure (MOP) only for upgrading the FPGA image of an SBC 7000 DSP-LC card when the SBC 7000 DSP-LC FPGA version is 0x14. The MOP can be applied at any version time, with the only restriction being that the BMC firmware version is at least 1.25.0. However, if the SBC application is running version V05.01.00R000 or higher, then the DSPs will be set to disabled and transcoding and transrating calls will fail if the SBC 7000 DSP-LC FPGA version is 0x14. Therefore, it is necessary to upgrade the SBC 7000 DSP-LC FPGA if the version is 0x14, before upgrading the SBC to 5.1.0. However, the MOP can be applied if the application version is higher than 5.1.0. Click Here to view the 550-06210_DSP-LC_FPGA_Upgrade_MOP.
The ConnexIP Operating System installation package for SBC Core:
Once the ConnexIP ISO procedure is completed, the SBC application package is automatically uploaded to SBC platforms.
The SBC Application installation and upgrade package for SBC Core:
sbc-V11.00.00R000-connexip-os_10.00.01-R000_331_amd64.qcow2.sha256
sbc-V11.00.00-R000.x86_64.tar.gz
sbc-V11.00.00-R000.x86_64.md5
For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.
These files are for SBC SWe deployments in the OpenStack cloud using VNFM.
For VNFM deployment, the VNF Descriptor (VNFD) file is provided in a Cloud Service Archive (CSAR) package for the type of SBC cluster being deploying. VNFs are independent and CSAR definitions are imported into the VNFM via an Onboarding mechanism. There is a procedure for producing the required CSAR variant, for different personalities (S-SBC, M-SBC), different interface types (virtio, sriov).
Files required for CSAR creation:
For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.
For details on CSAR creation, refer to Creating a CSAR Package File.
The SBC Core includes a feature that extends the use of hyper-threading to SBC SWe when it is installed on either the VMware or KVM Hypervisor platform. To take advantage of the performance improvements provided by hyper-threading, you must increase (double) the number of vCPUs configured in the VM prior to a software upgrade if upgrading SBC SWe KVM Hypervisor or VMware from pre-07.01.00R000 release to 07.01.00R000 or higher:
If upgrading vCPUs from less than 10 to 10 or more, click here and perform the steps as described.
Using older versions of ESXi can trigger a VM instance shutdown. To prevent this from occurring, you must upgrade the VMware ESXi -- refer to the End of General Support column on https://lifecycle.vmware.com/#/ for supported versions.
A LSWU on an SBC 7000 should only be performed when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur, thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down. Contact Ribbon Support immediately.
Customers using ERE Active Directory service(LDAP over TLS and AD server uses SHA1 hashing algorithm), they need to renew the certificates using SHA2 hashing algorithm. Alternatively, customers can ignore the server certificate validation at the SBC by manually updating the ldap.conf file(add new line 'TLS_REQCERT allow' in the file before the upgrade).
Release 8.2 and later requires additional user account security practices for SBC SWe deployments in Openstack cloud environments. During upgrade of SBC SWe cloud instances deployed using Heat templates, you must use a template that includes SSH keys or passwords for the admin and linuxadmin accounts. The example Heat templates have been updated to include information on how to specify this type of data in the userdata section of a template.
For the procedure specific to SBC SWe upgrades on KVM Hypervisor or VMware to take advantage of performance improvements due to hyper-threading, refer to MOP to increase vCPUs Prior to Upgrading SBC SWe on VMware or KVM Hypervisor.
The number of rules across SMM profiles in a system is limited to 10000, and the number of actions across profiles in a system is limited to 50000.
Ensure the above conditions are met before LSWU.
In NFV environments, the method used for upgrades involves rebuilding the instance, which requires additional disk space on the host. The minimum disk space needed for this operation is listed in the table below.
SWe SBC software enforces I-SBC instances to run only with a single vNUMA node in order to achieve deterministic performance. SWe SBC VM having >8 vCPUs hosted on dual-socket physical server with VMware ESXi software needs to follow the steps below to correct vNUMA topology before upgrading to latest SWe SBC software:
vsish -e get /net/pNics/<PKT port name - vmnicX>/properties | grep "NUMA"
If any of the above settings requires modification, follow the steps below on SWe SBC HA system:
numa.autosize.once = FALSE
numa.nodeAffinity’ = 0 or 1 (based on PKT port NIC affinity)
On ESXi 6.5 and above releases, vSphere web client can be used to add above rows under Edit settings > VM options > configuration parameters > add parameters;
For more information, refer to:
If the TRF/MRB Features are configured and enabled – some calls are unable to be cleared post upgrade if using the TRF/MRB attributes.
The upgrade is successful and calls continue but some calls may fail to clean up release post upgrade. Session KeepAlive and RTP Inactivity functions will clean any stale calls.
Enable the sessionKeepalive or rtpInactivity monitoring to ensure that mirrored calls are cleaned up post upgrade.
set addressContext default zone ZONE_AS sipTrunkGroup TG_AS_SIPP signaling timers sessionKeepalive <value>
OR
set system media mediaPeerInactivity <value>
set profiles media packetServiceProfile DEFAULT peerAbsenceAction peerAbsenceTrapAndDisconnect
Upgrade from a pre 9.2 release with globalization support for registration enabled will see a registration drop during an upgrade.
If the following localNumberSupport is enabled, those registrations will be dropped after first switchover during LSWU.
% set addressContext <name> zone <name> sipTrunkGroup <name> signaling localNumberSupport <disabled | enabled>
Prior to performing an upgrade to this release, you must remove usernames that do not conform to the SBC user-naming rules to prevent upgrade failure. Upgrade can proceed successfully after removing all invalid usernames. The following user-naming rules apply:
Usernames can contain a maximum of 23 characters.
The following names are not allowed:
tty disk kmem dialout fax voice cdrom floppy tape sudo audio dip src utmp video sasl plugdev staff users nogroup i2c dba operator
Note: Any CLI usernames consisting of digits only or not conforming to new user naming rules will be removed after performing a restore config in this release.
Prior to performing an upgrade to the 10.1 release, the dnsGroups with type mgmt must be specified/updated with the "interface" field. The steps are included in announcement "W-17-00022847".
If the above MOP is not run, the LSWU process may fail because of duplicate trunk group or zone names.
Prior to performing an upgrade to 10.1 release, the duplicate trunk groups or zones must be removed. The steps are included in announcement "W-17-00022689".
CPU resource allocation requirements for SBC SWe VM are strictly enforced. You must review and verify these VM settings (including co-hosted VMs) against the documented "VM Configuration Recommendations" on the For VMware page in the Hardware and Software Requirements section before upgrading.
If you encounter a problem, correct the CPU reservation settings as specified in step 6 of the "Adjust Resource Allocations" procedure on Creating a New SBC SWe VM Instance with VMXNET3:
Set the CPU reservation for the VM so that it equals the physical processor CPU speed, multiplied by the number of vCPUs divided by two.
For example, a configuration of 4 vCPUs with a processor of 2.99 GHz CPU speed, reserve: 2992 * 4/2 = 5984 MHz
If the VM uses the same number of vCPUs as the number of physical processors on the server, this reservation may not be possible. In this case, reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.
When using the show table system serverSoftwareUpgradeStatus
command during the upgrade, the Standby server's LSWU status will always display "Upgrading" even though the upgrade may have failed due to host checker validation. To check if host validation failed for the Standby, check for HostCheck Validation Failed message in the upgrade.out
log.
Perform the following procedure on the Standby to check for the Hostcheck Validation Failed message in the upgrade.out
log.
/opt/sonus/staging/upgrade.out
(this log shows the Hostcheck Validation Failed error).show table system serverSoftwareUpgradeStatus
to confirm the successful upgrade.Prior to performing a Live Software Upgrade (LSWU), verify if the system and the databases are in sync. The steps are included in announcement "Warning-14-00020748".
Customers who are using the SBC to interop with MS Teams need to review and compare their configuration against the latest configuration guide especially the SMM as it might result in call failures after upgrade if the older SMM is left in place. For more information, refer to the MS Teams Solution Guide.
(Note that there have been no changes to the MS Teams Solution Guide since release 8.2, so that guide is still applicable to later releases)
This release includes all bug fixes implemented in the releases which are documented in the Supported Upgrade Paths table of this release note.
To view bug fixes in previous releases, refer to the release note(s) of interest from the SBC 5xx0-7000-SWe Documentation Home page.
The SBC Core supports Live Software Upgrade from releases listed in the table below:
The following table displays the security vulnerability that was resolved in this release.
The Severity is based on the CVSSv3.x scores. For more details about the individual CVE, refer to https://nvd.nist.gov/vuln/search. Some low severity issues may not be listed.
Risk | Fixes |
---|---|
Critical | 13 (CVE-2022-23990,CVE-2022-25235,CVE-2019-17041,CVE-2019-17042,CVE-2022-22824,CVE-2022-22822,CVE-2021-44790,CVE-2022-22823,CVE-2021-43527,CVE-2022-25236,CVE-2022-25315,CVE-2021-39713,CVE-2022-23852) |
High | 68 (CVE-2021-4202,CVE-2021-3760,CVE-2022-24050,CVE-2019-7575,CVE-2019-7636,CVE-2021-3640,CVE-2021-3770,CVE-2019-7637,CVE-2022-23039,CVE-2021-4083,CVE-2019-7578,CVE-2022-24958,CVE-2019-7638,CVE-2021-46143,CVE-2022-27223,CVE-2022-24048,CVE-2021-20322,CVE-2019-13616,CVE-2021-44224,CVE-2021-25220,CVE-2022-23041,CVE-2021-45469,CVE-2021-23214,CVE-2022-23042,CVE-2022-24051,CVE-2019-7635,CVE-2018-25032,CVE-2021-45417,CVE-2022-24407,CVE-2022-22827,CVE-2022-23308,CVE-2021-39698,CVE-2022-22825,CVE-2022-0492,CVE-2021-44733,CVE-2021-22600,CVE-2019-7576,CVE-2022-23037,CVE-2019-7577,CVE-2021-45960,CVE-2021-3752,CVE-2021-22235,CVE-2021-39922,CVE-2022-23040,CVE-2021-3796,CVE-2021-3778,CVE-2021-39924,CVE-2021-39929,CVE-2021-39921,CVE-2021-39928,CVE-2021-41864,CVE-2021-43618,CVE-2022-24052,CVE-2022-0891,CVE-2021-39686,CVE-2022-23036,CVE-2019-7574,CVE-2022-0778,CVE-2022-25314,CVE-2022-0435,CVE-2021-39925,CVE-2021-39685,CVE-2019-7573,CVE-2022-0330,CVE-2021-38300,CVE-2022-22826,CVE-2021-39923,CVE-2019-7572) |
The following Severity 1 issues are resolved in this release:
Issue ID | Severity | Problem Description | Resolution | |
---|---|---|---|---|
1 | SBX-117637 | SBX-117966 | 1 | PortFix SBX-117637: The MNO I-SBC switchover sonusCpRedundGroupSwitchOverNotification. Impact: The SCM is coring when trying to free memory that has already been freed. Root Cause: The SCM is coring when trying to free memory because of non-reproducible edge case scenario that caused the memory to be freed before returning from a subroutine – and the calling function didn’t handle this correctly. NOTE: This scenario can only happen if downstreamForkingSupport is enabled on the SIP Trunk Group. Steps to Replicate: The steps cannot be reproduced. | The code is modified to prevent the scenario that allows the subroutine to free memory that has already been freed. Workaround: There is no known workaround. |
2 | SBX-117476 | SBX-118080 | 1 | PortFix SBX-117476: There is congestion memory in a customer lab. Impact: The SCM process is leaking memory when sendSBCSupportedCodecsForLateMediaReInvite is enabled in the IP Signaling Profile. Root Cause: The SCM process may not free internally allocated structure when sendSBCSupportedCodecsForLateMediaReInvite is enabled in Ip Signaling Profile. Steps to Replicate: Run load with “sendSBCSupportedCodecsForLateMediaReInvite” enabled in the IP Signaling Profile and confirm the leak. NOTE: The call flow must result in a NRMA Modify being sent internally. | The code is modified to ensure that these structures are freed. Workaround: Disabling sendSBCSupportedCodecsForLateMediaReInvite may prevent this issue. |
3 | SBX-111947 | SBX-117272 | 1 | PortFix SBX-111947: The SBC query on the SysDump.pl script. Impact: The addition of cloud-init logs collection is the sysdump script requested by the customer. Root Cause: Unavailability of cloud-init log collection in 8.2.2 sysdump scripts. Steps to Replicate: Run sysDump.pl on any cloud based setup to check if cloud-init logs are collected. | The code is modified to add cloud-init logs. Workaround: None. |
4 | SBX-117963 | SBX-118168 | 1 | PortFix SBX-117963: There was a switchover every five minutes on the SWe. Impact: While reporting statistics for Fault Avalanche Control, SAM process may core if reporting on a call with a callId larger than 24 characters. Root Cause: While reporting statistics for Fault Avalanche Control, an incorrect "maximum size" is used when copying a callId - resulting in the code writing past the end of an allocated buffer and corrupting memory. Steps to Replicate: Run some calls with FAC while collecting FAC statistics. The callids for these calls should be longer than 24 bytes. | The code is modified to use the correct "maximum size" when copying the callId. Workaround: Disable the Fault Avalanche Control. The Fault Avalanche Control feature is a feature, which blocks SIP messages of certain key elements that it is aware of that have caused multiple coredumps in the past, these calls should be blocked from being processed again. |
5 | SBX-114128 | SBX-116815 | 1 | Portfix SBX-114128: Video calls are not processed the first time. Impact: The usePsxRouteForRegisteredInvite works only for non TLS transports, the requirement is to enable this flag for TLS transports as well. Root Cause: The flag usePsxRouteForRegisteredInvite is not working for TLS transports. Steps to Replicate:
Expected Results: The call should go to PSX returned user instead of RCB's contact. | The code is modified to consider usePsxRouteForRegisteredInvite flag for all transports. Workaround: None. |
6 | SBX-117064 | SBX-117126 | 1 | PortFix SBX-117064: Increase the number of days for compressed CDR retention. Impact: Request to increase the maximum days compression from 7 to 14. Root Cause: The maximum allowed was previously set to 7. Steps to Replicate: Check that the "Days compression to keep" field in the eventLog typeAdmin screen can now be set to a maximum of 14. | The code is modified to allow the new maximum of 14. Workaround: None. |
7 | SBX-115937 | SBX-118025 | 1 | PortFix SBX-115937: The SBC switched over due to the Deadlock issue. Impact: The SBC switched over due to a Deadlock issue. The CPX process deadlocked while calling CpxTrunkGroupMediaIpSecondaryInterfaceGroupNameValidate to validate the SecondaryInterfaceGroupName while the customer was making several calls to get the authPassword. Root Cause: Due to the authPassword was being fetched many times a second, that call was occurring at the exact same time as the CpxTrunkGroupMediaIpSecondaryInterfaceGroupNameValidate was called. Both routines used the same global maapiSocket to do maapi calls to read the confd database. Since the same global socket was being used, the maapi_exists call hung. Steps to Replicate: In one CLI session, make many calls to get the authPassword: Observe that the CPX does not crash. | The code is modified so a CDB receives the authPassword, so there is not contention for the global maapiSocket. Workaround: Do not get the authPassword at the same time the setting the mediaIpSecondaryInterfaceGroupName. |
8 | SBX-117393 | SBX-118167 | 1 | PortFix SBX-117393: There was a SCM Process switchover and coredump. Impact: The SCM Process has cored when attempting to allocate memory. Root Cause: The SCM Process has cored when attempting to allocate memory because the memory management code has detected memory corruption. The memory corruption occurred because the code wrote into a memory block after it is freed. This appears to have occurred when SRS gets blacklisted during setup and call needs to route advance to next SRS. Steps to Replicate: The steps cannot be reproduced. | The code is modified to prevent writing into this memory block after the memory block is freed. Workaround: There is no known workaround. |
9 | SBX-114778 | SBX-116003 | 1 | PortFix SBX-114778: The STOP RECORD is missing from CDR VIEWER after a switchover. Impact: STOP RECORD IS MISSING from CDR VIEWER after a switchover. Root Cause: With the current Logstash configuration, the logstash reads the TRC and ACT files only from the time when the logstash was started, which means older data is not read by logstash. When a switchover occurs, by the time logstash is started all the calls would have completed thereby updates to TRC and ACT would have stopped. Logstash does not read the TRC and ACT files until they are updated again. When the updates start, logstash does read from the point where the new data is written and not the old data. This is the reason why stop record of the calls are not shown after the switchover Steps to Replicate:
The STOP record should be displayed | The code is modified to read the older data and not just the new data. Workaround: None. |
10 | SBX-115616 | SBX-116378 | 1 | PortFix SBX-115616: Routing label settings could not be changed in the EMA if created by the CLI. Impact: Routing label settings could not be changed in the EMA if created by the CLI. Root Cause: CLI was allowing _ + - . : @ characters in the Routing Label name. The EMA, however, was allowing only _ character in Routing Label name. Due to this Routing Label updates, the settings was failing in the EMA. Steps to Replicate:
| The code is modified to allow special characters + - . : @. Workaround: No workaround. |
11 | SBX-116386 | SBX-118219 | 1 | PortFix SBX-116386: Azure: An upgrade is failing from 10.1R00 build to 10.1.1 on HFE2.1. Impact: In the Azure SWe, during the 1:1 upgrade, due to sporadic network connectivity issues in HA network, the upgrade may fail due to a loss of the SBC APP configuration. Root Cause: Split-brain could occur due to sporadic network connectivity issues in the Azure platform. If this network connectivity issues occurs during the upgrade procedure, then there is a possibility of losing the SBC configuration, that could result in upgrade failures. Steps to Replicate:
| The code is modified to ensure that the SBCs wait for more time (approximately 10 minutes from 10 seconds) to make sure that the SBCs do not enter into the split-brain detection procedure early on. This helps prevent split brain occurences. Workaround: None. |
12 | SBX-118118 | SBX-118173 | 1 | PortFix SBX-118118: Both units went down after unregistering from the EMS. Impact: Both units went down after unregister from EMS Root Cause: The code in the ENM process which handles the notification of the deletion of the SnmpAgent snmpTargetMib snmpTargetAddrTable snmpTargetAddrEntry spawns a thread to delete the corresponding trap from the oam snmp trapTarget table that shares a cdb socket with SonusSnmpTrapTarget::ProcSubDelete. This resulted in a deadlock and the ENM process stops to clear the deadlock. Steps to Replicate:
Observe that the ENM process does not crash. | The code is modified to use its own cdb socket so that there is not any contention from two threads for the same socket and to avoid the deadlock situation and in turn, avoid another coredump. Workaround: None. |
13 | SBX-116205 | SBX-116759 | 1 | Portfix SBX-116205: Services are not coming up in standby node after upgrading to 10.1.1 from 9.2.3R1 in hardware 7000 setup. Impact: The SBC service is not coming up on standby after upgrade. Root Cause: Standby confd is trying to connect to active confd during upgrade which fails causing SBC application to go down. Steps to Replicate: Perform standby upgrade and then active upgrade to ensure both the services are coming up during and after the upgrade. | Avoid sonusMgmtIpInterface XML file exchange between active and standby so that standby confd does not connect with active confd during the upgrade. Workaround: No workaround. |
14 | SBX-114591 | SBX-117275 | 1 | PortFix SBX-114591: After adding AclRule in the S-SBC and enabling it, the OS rebooted and application would not come up. Impact: The SWe_NP process exits during DPDK ACL trie build operation causing the SBC to go for reboots. Root Cause: There was no limit set for the memory requirement of DPDK ACL trie build process, this results in DPDK consuming more huge pages than available on the system and causing SWe_NP process to exit. Steps to Replicate:
| The code is modified to limit the memory requirement of DPDK ACL trie build process. Workaround: Increasing the RAM of the instance to 64G could be a possible workaround. |
15 | SBX-116997 | SBX-117540 | 1 | PortFix SBX-116997: Late media pass-through calls fail after an upgrade from 8.2.2R0 to 8.2.6R0 - root cause is the RTCP termination for pass-through calls flag enabled. Impact: Late media pass-through calls with "RTCP termination for passthrough" flag enabled failed. Root Cause: There are two receiver IDs in the RTCP termination Bus RESource definition. If one of the RIDs was not enabled during the BRES activation, the ingress XRES (ethernet resource) had not learned the destination MAC address yet, then the RTCP Gen is left enabled according to the design. When that BRES gets deactivated, skip the sending RID disable command to NP for that not enabled RID, and also missed issuing RTCP Gen disable command to NP. So when that BRES gets re-activated, the logic detected that RTCP Gen has already been enabled and failed the activation process, which then fails the call. Steps to Replicate: Establish a late media pass-through call with "RTCP termination for pass-through" flag enabled. The SBC will send a SIP BYE once it receives the SDP answer in the SIP ACK SDP. | The code is modified to send RTCP Gen disable command to NP even when RID is not enabled. Workaround: Turn off the "RTCP termination for pass-through" flag. |
16 | SBX-117422 | 1 | Observing core dumps in the SBC while running bulk configurations. Impact: A core dump was observed in the SBC. Root Cause: A core dump was generated as cdb call for ACL taking time. This is race-condition and do not see this often. Steps to Replicate:
| The code is modified to disable healthcheck during this operation. Workaround: None. |
17 | SBX-114533 | 1 | The CPX not handling the notification correctly from SDR. Impact: The SNMP traps destinations set by the FQDN are not resolved correctly to IP. Root Cause: The ConfD CDB API return inconsistent data when reading from CDB_RUNNING. Steps to Replicate:
| The Management Agent API (MAAPI) is now being used to read the SNMP trap target information instead of the CDB API. Workaround: Restart the SBC. |
18 | SBX-115231 | 1 | Possible stack overflow vulnerability in the RTCP processing. Impact: Potential stack overflow vulnerability was identified through the internal code review in the RTCP generation subsystem of SWe NP module. Root Cause: The root cause of the problem was identified to the use of variables of an incorrect storage size. Steps to Replicate: The steps cannot be reproduced. | The code is modified to address the vulnerabilities. Workaround: No workaround. |
19 | SBX-117469 | 1 | Azure: Upgrade is failing from 9.2.3R4 build to 11.0.0 on standalone. Impact: Upgrades are failing in Azure using Ribbon IaC package. Root Cause: Newer versions of the Azure CLI change the way it authenticates, meaning it no longer works with the Ribbon IaC package. Steps to Replicate:
| The code is modified to install Azure CLI version 2.24.0 Workaround:
|
20 | SBX-118191 | 1 | An upgrade is successful but revert operation failed - V10.1.0R2 to V11.0. Impact: The SBC application does not come up after revert on Cloud 1:1 mode. Root Cause: The SBC application gets stuck due to Openclovis model update cache on old active disk. Steps to Replicate:
| The code is modified to indicate this model update cache and perform a model update on standby after revert to remove any component that is not needed. Workaround:
|
21 | SBX-118668 | 1 | Performance: Observed "SIPSG" MAJOR log after sync complete with the first admin switchover while running SIP-SIP cyclic call load for testing 10 admin switchover on Bluefin HA Pair on build #271 Impact: When the SIPREC or Call Notification feature is enabled and an internal error like the SIP transaction occurs for the CS call, the SBC generates MAJOR level logs stating the msgId was not available. Root Cause: For internally generated response codes for events like transaction timeout on CS calls, there are no message handles and message indexes. The SBC is making an attempt to store SIP headers that are required for call notification and SIPREC features, and since the msgId or msgHandle is not found, an error log is generated. The logic to store the SIP Headers from SIP response should have worked only when CLI "metaDataSource" in "sipRecMetadataProfile" is set to "fromLatest" but the MAJOR logging is independent of the feature control. Steps to Replicate:
| The code is modified to skip making an attempt to store SIP Headers for internal errors like SIP transaction timeouts as there is no actual SIP response message from network. The SBC should consider SIP headers for metadata population only for actual SIP responses coming from network. Workaround: None. |
22 | SBX-113818 | 1 | The GW-GW Performance load on 7000: System Congestion and the SAM Process crash observed while doing CLI switchover(core dump profile set to sensitive). Impact: Observed the SAM process core during a GW-GW performance load test. Root Cause: A GW-GW OPEN REQ was received on an old socket, and at the same time originating GW tried to create new connection (This is due to the original GW being so congested an OPEN REQ took a long time to get from GWFE to GWCM). In a receiver GW, the GWFE requests the GWCM to send OPEN ACK on a new socket. As a result of this process, this creates new GW-GW link at originated GW, but the receiver GW is still not aware of new GW-GW connection as it replied to old OPEN REQ in new socket. Originating GW start sending link PING packets, which receiver GW thinks this is invalid event as per Receiver GW new connection not established yet. This created a system error in the receiver GW. Steps to Replicate:
Expected Result: The Max rated SIP-GW call load should be recover successfully after the switchover. Actual Result: The IM cored in new active box and after that received a "SAM Process" core on a 7000 Adapter. | The code is modified so that the GWCM is sent out OPEN ACK packet on socket it received OPEN REQ message. Workaround: None. |
23 | SBX-117032 | 1 | The Cloud SBC services are taking more time to come than usual after few suites executed successfully (~14) in CICD2 project Impact: The SBC fails to load sonusMgmtInterface.xml file in CDB while coming up. Root Cause: In CHM process, resetting of mgmtStaticRoute table and loading of sonusMgmtInterface.xml are run in parallel, which causes issue while loading XML file in some cases due to a race condition. Steps to Replicate: Launch the SBC on Cloud platform and check for failure in loading sonusMgmtInterface.xml file. | The code is modified to allow resetting of mgmtStaticRoute table to complete before loading sonusMgmtInterface.xml file. Workaround: No workaround. |
24 | SBX-118988 | 1 | The sysDump saved with an owner as root even though sbcDiagnostic 2 is run with linuxadmin as user. Impact: In the Cloud SBC when sysdumps are generated using sbcDiagnostic command as linuxadmin user, linuxadmin is unable to copy the sysdumps due to restricted permissions. Root Cause: sbcDiagnostic was generating sysdumps with root ownership, which did not allow linuxadmin to copy them. Steps to Replicate:
With a fix, linuxadmin should be able to copy sysdumps. | The code is modified to allow copying. Workaround: None. |
25 | SBX-117772 | 1 | PRS process coredumps generated after a switchover on the SBC (the standby is not coming up). Impact: PRS process core dumps after a switchover on the SBC. Root Cause: The race condition happens between BRM and XRM for T.38 implementation. Steps to Replicate:
| The code is modified to check that the BRM context already created on standby before it retrieves BRES ID. Workaround: Not available. |
26 | SBX-118635 | 1 | Observed IpSockAddr (0.0.0.0) and Port (0) for Egress leg in GW1 and Ingress leg in GW2 for GW-GW HPC call scenario. Impact: The IpSockAddr and Port fields are 0 in the global callDetailStatus status command in a GW-GW HPC call scenario. Root Cause: In 9.2.4R001, the code was added to not send CPC_OP structures unknown to the GW-GW encoder layer over the GW-GW link to reduce the size of the GW-GW message sent to older SBCs and the GSX. However, it was found that at least one of these unknown CPC_OP Structures, CPC_OP_SIP_ZONE_AC_NAME_STR was used to transfer information used in the global callDetailStatus status command. Steps to Replicate:
| The code is modified to send the unknown CPC_OP structures to the GW-GW encoder layer over the GW-GW link. Workaround: None. |
The following Severity 2-4 issues are resolved in this release:
Issue Id | Severity | Problem Description | Resolution | |
---|---|---|---|---|
1 | SBX-116025 | 2 | After multiple transfer's, the call is failing when trigger a switchover in the D-SBC HA. Impact: A calls B.
Root Cause:
Steps to Replicate: Run a basic call, and the call load is tested. | The code is modified to:
Workaround: None. |
2 | SBX-107636 | SBX-116743 | 2 | Portfix SBX-107636: Observing wrong MGMT gateway IP for an active SBC in mgmtStatic route of the SBC. Impact: The loadConfig with a configuration dump taken from a different network, loses network connectivity to the management interface. Root Cause: When loadConfig is attempted from a configuration dump taken from a different network, default management routes are not reset. Because of this, the node is not reachable. Steps to Replicate:
| The code is modified to delete and load management static routes of active and standby at every startup, Workaround: Manually load the XML file by logging on to console. |
3 | SBX-114693 | SBX-117068 | 2 | Portfix SBX-114693: Need to Update all the Application code to set the V6 loopback address. Impact: The SBC fails to identify an address as loopback address for an IPv6 call. Root Cause: There is a disconnect between the method used to set the IPv6 loopback address and the method used to check it. Steps to Replicate:
| The code is modified so that the SBC identifies the loopback address for an IPv6 call correctly. Workaround: None. |
4 | SBX-117280 | SBX-117653 | 2 | PortFix SBX-117280: Apache Axis security issues Impact: The following vulnerabilities related to Apache 1.2 are identified within the Ribbon SBC application:
Root Cause: The CLI uses the unsupported Apache Axis 1.2 (2005), exposes the Apache Axis AdminServlet without authentication, and runs as the sonusadmin user which is a privileged account. Steps to Replicate:
| There is no required fix for issue number one. Axis 1.2 has three vulnerabilities that do not affect the SBC application:
Axis 1.4 has the same vulnerabilities plus one new vulnerability that could impact the SBC application.
The SBC has not been upgraded to Axis 1.4. For issues two and three, the code is modified to remove AdminService. Workaround: None |
5 | SBX-117921 | SBX-117925 | 2 | PortFix SBX-117921: A de-reference a NULL return value. Impact: The SCM process allocates a null pointer resulting in a crash. Root Cause: While trying to remove the EVS codecs from a call with a leg associated to the MRF/MRFP, the associated call leg is removed due to a race condition and the code dereferences a NULL pointer. Steps to Replicate: The steps cannot be reproduced. | The code is modified to defend against the race condition and validates that the associated call leg pointer is not NULL before dereferencing it to avoid a coredump. Workaround: None. |
6 | SBX-118051 | SBX-118330 | 2 | PortFix SBX-118051: DTLS client Hello being ignored. Impact: The SBC ignores the DTLS Client Hello message resulting in no audio in the STUN/ICE/DTLS calls when the endpoint performs STUN checks for two candidates and they overlap. Root Cause: The SBC stores a remote IP/port in the nominated candidate list even if the BREQ/BREQ_UC messages have started to be sent out. When the BREQ message resends the SBC uses the remote IP/port from the stored nominated candidate array and causing confusion. Steps to Replicate: Establish a STUN/ICE/DTLS call and have the endpoint initiate the STUN connection checks with two candidates. The STUN checks should overlap in the following manner:
| The code is modified:
Workaround: None |
7 | SBX-113150 | SBX-115737 | 2 | PortFix SBX-113150: The SBC alarm type field is missing. Impact: The SBC alarm type field is missing. Root Cause: Details about the alarm type are missing. Steps to Replicate:
| The Alarm Type is replaced. Additional information is provided for the alarm severity and description fields. The alarm reporter field is removed. Workaround: None |
8 | SBX-116044 | SBX-117770 | 2 | PortFix SBX-116044: The ipPeer pathcheck command is not working. Impact: The ipPeer pathcheck command is not working. Root Cause: The URL is not encoded as the backend expects. The URL expects it to be in encoded format from 8.x. Steps to Replicate:
| The code is modified to encode the URL before sending it to the backend. Workaround: None. |
9 | SBX-114814 | SBX-116885 | 2 | Portfix SBX-114814: The SAM process cores after the surrogate registration executes. Impact: The SAM process cores after the surrogate registration executes. Root Cause: The SIPFE_SURRREG_MAX_PROFILES is at 256 and needs to be increased to 1000. Steps to Replicate:
| The SIPFE_SURRREG_MAX_PROFILES is increased to 1000. Workaround: None |
10 | SBX-115735 | SBX-116814 | 2 | Portfix SBX-115735: The interception of a challenged SUBSCRIBE message on the SBC fails. Impact: The SBC fails to intercept a challenged SUBSCRIBE message. Root Cause: Due to a design issue, the SBC fails to intercept a challenged SUBSCRIBE message. Steps to Replicate:
| The code is modified to intercept a challenged SUBSCRIBE message. Workaround: None. |
11 | SBX-115978 | SBX-116005 | 2 | PortFix SBX-115978: The import operation is not working in the EMA SWE setup. Impact: The import operation is not working in the EMA SWE setup. Root Cause: The exportCmd in the SWe is used to start the import operation and is taking more than five seconds to start. The status in the UI is not updating and the import appears not to have started. Steps to Replicate:
| The code is modified to add an additional five seconds delay in the UI before calling the getStatus API to get the status of the import operation. The UI will now make a getStatus call ten seconds after starting the import. Workaround: None. |
12 | SBX-117900 | SBX-118060 | 2 | PortFix SBX-117900: The Azure-SWe SLB reboots as a result of memory corruption. Impact: The Azure-SWe SLB reboots as a result of memory corruption. Root Cause: A memory corruption issue produces a memcpy into a buffer that isn't large enough. This memcpy is in code related to the SLB function. Steps to Replicate: The steps cannot be reproduced. | The code is modified to verify the buffer size before the memcpy. Workaround: None. |
13 | SBX-114818 | SBX-116954 | 2 | PortFix SBX-114818: An 18x/200 Contact header sent by the SBC contains a port number different than 5061. Impact: The endpoints are registered over the TLS with a CDC configured SBC. The sig port that the SBC picks for outgoing messages keeps increasing. The messages are sent to non-existing ports. Root Cause: The CLI changes the sig port table which should be configured as sig port. Steps to Replicate:
| The code is modified to configure the sig port table. Workaround: This problem occurs only when the CDC is configured and registered via the TLS. |
14 | SBX-116011 | SBX-116964 | 2 | PortFix SBX-116011: The SBC should not send registration request to LM when it is in N to 1 Mode Standby. Impact: If an SBC is running as an N to 1 standby, and licenses are installed but the capacity license is not present, after 90 days the standby license count will revert to 0. Root Cause: Since license usage statistics are not collected on the standby, registration with the license manager will fail. Steps to Replicate:
| The standby on the N to 1 system will no longer attempt to register with the License Manager until the standby becomes active. When it becomes active, the last successful registration time from the former active will determine the grace period left on the newly promoted active. For example, if the former active had not been able to register with the license server for 30 days, then the newly promoted active would now have 60 days left of the default 90 day grace period to successfully register with the License Manager. Workaround: Switch over to the standby before the end of the grace period. |
15 | SBX-113553 | SBX-116881 | 2 | Portfix SBX-113553: Interworking between a 100 REL compliant UAS and a non 100 REL UAC. Impact: Interworking between a 100 REL compliant UAS and a non 100 REL UAC Root Cause: The UAC is not 100 REL compliant and the SBC cannot forward the UPDATE to the UAC. It fakes a local answer 200 OK for this UPDATE with all the supported codecs of the UAC. This makes the SBC pick a pass through codec which is different from the codec already communicated to the UAC. An audio issue results until the call gets connected. Steps to Replicate:
| The code is modified so that the SBC fakes the local answer 200 OK (for UPDATE here) with the last negotiated codec which is already communicated to the peer. The codec selection remains the same even after the offer-answer completion during an UPDATE-200OK handshake and there will not be any audio mismatch. Workaround: None |
16 | SBX-114056 | SBX-116412 | 2 | PortFix SBX-114056: An RTCP goodbye message is sent after a 183 RESPONSE. Impact: When monitoring a profile is enabled with an early media configuration, the early media from the endpoint is triggered. The Root Cause: The indication to stop monitoring is passed as soon as the early media is received. The deactivation and reactivation of resources cause it to send the RTCP bye packet with the SSRC. The SSRC is received from the endpoint. Steps to Replicate:
| The RTCP bye packet is suppressed for early media when the endpoint is playing the media. Workaround: Disable the monitoring profile. |
17 | SBX-116206 | SBX-116745 | 2 | PortFix SBX-116206: The Relay Flag "Reason Phrase 4xx-6xx ", in the ERE is not working properly Impact: The Relay Flag "Reason Phrase 4xx-6xx " is not set properly when the command is executed in the ERE.
Root Cause: The yang file and the SBX PIPE file values are not in order. Steps to Replicate:
| The code is modified in the yang file. Workaround: None. |
18 | SBX-116942 | SBX-117480 | 2 | PortFix SBX-116942: The XRM/NP CPU is utilized by a system task. Impact: In the SWe, a few sbxPerf processes (example: top2, atop) have to run on the system core0 but instead are running on different cores. Root Cause: In the SWe, the sbxPerf process has to run exclusively on the system core0. Steps to Replicate:
| Move the execution of the cset.sh script from the system core0 to the system cgroup. Workaround: None |
19 | SBX-115464 | SBX-116932 | 2 | Portfix SBX-115464: The SBC auto-registration in the EMS is not working with the EmsFqdn. Impact: The SBC auto-registration in the EMS is not working with the EmsFqdn. Root Cause: The SDR is not setting the RD bit in the DNS query. This causes a query to the Route53 DNS to fail as the DNS recursion is required to resolve the entries by using the default DNS setting. Steps to Replicate:
| The code is modifIed and the SDR now sets the RD bit in the DNS query by default. Workaround: Modify the SDR DNS backend setting through the ConfD to set resolve.recurse to true. |
20 | SBX-116335 | SBX-117353 | 2 | PortFix SBX-116335: The SBC EMA presents only the SSL server certificate, instead of the full certificate chain. Impact: The SBC EMA/PM web server isn't sending the full certificate chain while negotiating the TLS with clients. Root Cause: The SSLCACertificateFile option is commented in SBC which makes the EMA/PM server send only its serverCertificate to the clients. Steps to Replicate:
| The code is modified to add the SSLCACertificateFile option. Now the EMA/PM web servers will send the CA certificate along with the server certificate during TLS negotiations. Workaround: None. |
21 | SBX-115994 | SBX-117551 | 2 | PortFix SBX-115994: The SBC is removing the DTG information on receipt of 3xx, when configuring the last trunk as incoming/outgoing. Impact: The SBC is removing the DTG information on receipt of 3xx, when configuring the last trunk as incoming/outgoing. Root Cause: While performing a TRM lookup for DTG information in the TrmProcessIpLookupCmd():
it iterates through all the Contact headers and saves the DTG information (for example: TG name, blocking status, and Trunk Type) in:
Steps to Replicate:
| Two new local variables are created in the TRM_IP_LOOKUP_EGRESS_TYPE_DTGNAME_ONLY :
After each iteration, when the status != FOUND_BLOCKING, these new local variables are populated and then used in the TrmIpSendLookupRpyNfy() for the TRM reply. Workaround: None. |
22 | SBX-107636 | SBX-116742 | 2 | Portfix SBX-107636: The AWS is observing the wrong management gateway IP for the active SBC in the mgmtStatic route of the SBC. Impact: The loadConfig, with a configuration dump taken from a different network, loses network connectivity to the management interface. Root Cause: When the loadConfig is attempted from a configuration dump taken from a different network, the default management routes are not reset resulting in the node being unreachable. Steps to Replicate:
| The code modified to delete and load management static routes for active and standby at every startup, Workaround: Manually load the XML file by logging on to the console. |
23 | SBX-117799 | SBX-118280 | 2 | PortFix SBX-117799: The SBC fails to recognize the PRACK in a multi-dialog (different TO tags) if 18X and 200OK are received simultaneously. Impact: For dialog transparency and a forked call, the SBC may reject a PRACK request due to a rise condition of back to back 18X and 200OK. Root Cause: After receiving a 200OK, the SBC finalizes the active remote tag and queues up to send out to the ingress as a result of a pending PRACK. When the PRACK is received, the SBC rejects it because the PRACK is coming from a different remote tag which does not match with the one in 200OK. Steps to Replicate:
| The SBC validates the remote tag based on the forking list not the finial one. Workaround: Disable the PRACK. |
24 | SBX-116605 | SBX-116668 | 2 | PortFix SBX-116605: The SBC does not log SIP messages to the TRC file when routing calls using the DNS Lookup. Impact: The SBC does not log SIP messages to the TRC file when routing calls using the DNS Lookup. Root Cause: During a DNS lookup, the LogInfoSpec is not set with the proper logging details in the SIPCall data structure. Steps to Replicate: Make a call from the Ingress side with the DNSLookup enabled. Post the call as successful and check the TRC file. | The code is modified to address the issue. Workaround: None. |
25 | SBX-116307 | SBX-116474 | 2 | PortFix SBX-116307: Once the /var/log partition is filled in the SWe N:1 HA setup, the SBC services do not shut down. Impact: Once the /var/log partition is filled in the SWe N:1 HA setup, the SBC services do not shut down. Root Cause: The system fails to handle the condition that fills up 95% of the /var/log partition during the SWe setup. Steps to Replicate:
| The code is modified to include the SBC SWe. Workaround: None. |
26 | SBX-116807 | SBX-117156 | 2 | PortFix SBX-116807: The upgrade fails in one of the MRFP nodes due to OS issues while mounting the log disk volume. Impact: An install or upgrade fails due to OS issues while mounting the log disk volume. Root Cause: After mounting the log volume, the system is stuck while trying to reboot. All appropriate logs are written to the new mount point. Steps to Replicate:
| The code is modified to use the systemctl commands to reboot the instance. Workaround: If the system gets stuck, then perform a manual reboot to continue. |
27 | SBX-116698 | SBX-117102 | 2 | PortFix SBX-116698: The SBC is sending out an Error-Info header in a 400 Bad Request even when the suppressErrorInfoHdr flag is enabled. Impact: The SBC is sending out an Error-Info header in a 400 Bad Request even when the suppressErrorInfoHdr flag is enabled. Root Cause: After the SBC restarts, the suppressErrorInfoHdr flag value is not updated correctly. Steps to Replicate:
| The suppressErrorInfoHdr Flag value is updated properly after a restart. Workaround: None. |
28 | SBX-115343 | SBX-116886 | 2 | Portfix SBX-115343: The SAM Process crashes during a 256,000 surrogate registration run on a SBC 5400 HA set up. Impact: The SBX 5100 can support the surrogate registrations up to 110,000. When the number of surrogate registrations configured is more than the accepted limit, a SAM Process crash results. Root Cause: There is no limit applied for a surrogate registration configuration based on the HW type. Steps to Replicate: Configure more than 110,000 surrogate registrations in the SBC 5100 box. | The code is modified to apply limits for surrogate registration configurations based on the HW type. Workaround: None. |
29 | SBX-114730 | SBX-116761 | 2 | Portfix SBX-114730: For AWS, errors related to the SD registration should be removed in case no values are provided during the SBC launch Impact: While running the command sbcDiagnostic 2 shows the following errors on the AWS when no sdregistry servers are given in the configuration. Root Cause: The JSON data is converted into unicode instead of a string when the meta data and user data load. Steps to Replicate:
| The code is modified to address the issue. Workaround: None. |
30 | SBX-116842 | SBX-117195 | 2 | PortFix SBX-116842: Observed Major Logs (.MBS: .CCS .PsObjectFactoryManager: Failed to find object's prototype while operating on object ID 171553 (0x29e21)) on 5:1 setup during an MRFP 9.1R5 to 9.1R6 upgrade. Impact: There are number of instances of the following log message in the .SYS log during an MRFP upgrade: 165 03092022 173545.777690:1.01.00.00434.MAJOR .MBS: .CCS .PsObjectFactoryManager: Failed to find object's prototype while operating on object ID 171553 (0x29e21) Root Cause: Fault avalanche (FAC) logic was enabled by default on the MRFP, and FAC logic was sending some unexpected messages. Steps to Replicate:
| The code is modified to automatically disable fault avalanche on MRFP. Workaround: None. |
31 | SBX-112275 | 3 | Application communication failure with the JSON CLI output format. Impact: When user tries to format CLI output as JSON, may cause error "Application communication failure" Root Cause: The issue is due to some tables that are deprecated/obsoleted many years back still have a confd call point and is causing the failure. Steps to Replicate: Pipe the CLI output through display filter and ensure that appropriate information is retrieved. | The code is modified to address the issue. Workaround: Use 'xml' formatter instead of json. |
32 | SBX-117119 | 2 | The removeSavedConfig does not delete a saved config file unless 'show table system savedConfigList' is called beforehand. Impact: The removeSavedConfig does not delete a saved config file unless 'show table system savedConfigList' is called beforehand. Root Cause: When savedConfig and removeSavedConfig called one after the other, the internal list did not have the path to delete the file. Steps to Replicate:
| The code is modified to update the internal list with path and file name. Workaround: Before calling the removeSavedConfig, call the "show table system savedConfigList" |
33 | SBX-114151 | 2 | A pre-upgrade BMC version check has issues. Impact: In an upgrade case, if the BMC is incompatible with app version, a pre- upgrade check should give a warning and complete the pre-upgrade checks. But the pre-upgrade is stopped with incompatible BMC version as a error. Root Cause: In the pre-upgrade, the script incompatible BMC version set as error message and stopped pre-upgrade checks. Steps to Replicate: Upgrade the app with an incompatible BMC version. | The code is modified to continue the pre-upgrade checks and set incompatible the BMC version as a warning. Workaround: Upgrade the BMC to the required version. |
34 | SBX-118350 | 2 | Traps are not generated for Ingress and egress Packet loss when Packet loss action set to 'Trap' in both PSPs. Impact: Traps are not generated for Ingress and Egress Packet loss when Packet loss action set to 'Trap' for the SBC. Root Cause: Packet loss reporting is disabled if a silence detection threshold of zero is specified along with setting the Packet loss action to 'Trap'. Steps to Replicate: Set Packet loss action to 'Trap' with a silence detection threshold of zero. Verify that traps are generated for any packet loss. | The code is modified so that the packet loss reporting is not disabled if a silence detection threshold of zero is specified along with setting the Packet loss action to 'Trap'. Workaround: Ensure that the specified silence threshold value is a non zero value. |
35 | SBX-113596 | 2 | The Metavar search is failing on OAM for different CLI's on different OAM nodes. Impact: The metavar validation failed during automation. Root Cause: The metavar validation failed during automation. This is a race-condition mainly when multiple CDB data queries are done. Steps to Replicate: Run the metavar related configuration in automation. When running normal a CLI configuration, we do not see this race-condition. | The code is modified for the CDB, even if it was present. Workaround: Manually fail the CLI command, as this is only observed during automation. |
36 | SBX-116190 | 2 | Egress congestion handling should only be enabled for the 503 with a retry. Impact: The SBC was treating 503 with or without Retry-After header as peer overload scenario. But the SBC should only treat 503 responses with retry-after because those are unambiguously overload related. Root Cause: The SBC was not verifying for the presence of Retry-After header to consider it as a peer overload scenario. Steps to Replicate: Send a 503 with Retry-After header for a SIP INVITE. | The code is modified to address the issue. Workaround: None. |
37 | SBX-117279 | 2 | The SBC init.d script checkForUpgradeRevert() file parsing is forgiving and can facilitate arbitrary command execution. Impact: One of the scripts on the SBC has a security issue that in a particular scenario can cause potential privilege escalation from sonusadmin to root. Root Cause: Script was running a marker content without input validation and location of marker was not secure. Steps to Replicate: This code block gets executed only when an upgrade from version which has single debian root partition to three partition model. It is not applicable for any 6.0 or later installations. | The code modified to move the marker to a secure location owned by root and input validation is added in script as a added measure. Workaround: No workaround. |
38 | SBX-117235 | 2 | An additional UPDATE is being triggered by the SBC when the server side sends 18x with Valid Video Port. Impact: In a delayed tone play scenario, the SBC is sending an additional UPDATE when egress EP sends 18x with valid audio and video ports Root Cause: The SBC completed an initial offer-answer in INV and 18x with valid Audio and Video ports. Later, due to delayed tone play logic, the SBC started playing the tone. As part of this tone play activation, the SBC is trying to switch OFF the video stream by triggering an UPDATE with video port as zero. The 200 OK (for UPDATE) is causing the SBC to abort the tone which is not supposed to happen. Steps to Replicate:
| The code is modified so that the SBC does not stop the tone play upon receiving a 200 OK (for UPDATE) response from the ingress EP. Workaround: None. |
39 | SBX-117972 | 2 | While expecting BYE, the SBC is sending an INVITE to egress side. Impact: The SBC sending a re-INVITE with text stream disabled when the egress EP sends 200 OK with Audio stream alone. Root Cause: Since, the egress EP sent 200 OK with only audio stream, SBC internally disables the text stream on both call legs that is resulting in triggering of a Re-INV with text stream disabled towards UAS side. Steps to Replicate:
| The code is modified so that if the peer already disables any media stream and if the SBC tries to trigger a re-INVITE towards the peer for disabling the same media stream, then suppress the triggering of the re-INVITE. Workaround: None. |
40 | SBX-118046 | 2 | The NULL pointer passed as an argument, which is declared to never be NULL. Impact: Call forking scenarios can access the NULL pointer while comparing Call ID information. Root Cause: The behavior of performing a string comparison on a null pointer is undefined. It has not been seen to cause any customer issues to date. Steps to Replicate:
| The code is modified to check that the Call ID pointers are not NULL before performing a comparison on the contents to avoid any unexpected behavior. Workaround: None. |
41 | SBX-118155 | 2 | The S-SBC is unable to send the UPDATE towards the UAS endpoint for 183 dialog-3 during EGRESS precondition interworking scenario. Impact: The S-SBC is unable to send the UPDATE towards the UAS endpoint for 183 dialog-3. Root Cause: When ingress was not supporting UPDATE, the SBC was trying to send out and stuck in this state. Steps to Replicate:
| The code is modified to locally answer the UPDATE when ingress peer does not allow UPDATE Workaround: None |
42 | SBX-117911 | 2 | A call between Cisco EP and PSTN failed as the SBC is sending incorrect attribute value for Video port 0. Impact: The SBC sends a=sendrecv instead of a=inactive when video stream is received with port 0. Root Cause: When changes were made to support additional video parameters in 9.2.x release, the datapath mode WSA set to default(a=sendrecv) when video stream was marked as absent. This was causing the SBC to send a=sendrecv. Steps to Replicate:
| The code is modified to inactive when video stream is marked as absent when port 0 is received. Workaround: No workaround. |
43 | SBX-116123 | 2 | The value set against GPU flag in /opt/sonus/conf/swe/capacityEstimates/.activeCallMixInput.json file is not an integer value" error message in DBG Impact: On Managed N:1 MRFP node, when a custom CPU profile is applied, from OAM, by specifying the value against the useGPUForTranscoding field to false, following critical level message is logged in the .DBG file: Root Cause: On N:1 Managed MRFP node, the CDB gives the value against the filed useGPUForTranscoding as False(string), rather than 0(integer). Steps to Replicate: For reproducing the issue on Managed N:1 MRFP, activate a traffic profile with useGPUForTranscoding value set to false, from the OAM, as shown below: | The code is modified to address the issue. Workaround: No workaround. Note: The log does not indicate an error in the functionality of profile activation. |
44 | SBX-117948 | 2 | Deletion of a SMM Profile with 768 rules is failing. Impact: Deletion of a SMM Profile with 768 rules is failing Root Cause: There was a restriction of 1000 transactions per commit to avoid health check issues leading to failure while deleting SMM profile with large number of rules. Steps to Replicate: Validate that deletion of SMM profile with 768 rule succeeds. | The code is modified as the operation was already being performed by disabling the healthcheck timeout for the duration of operation. Workaround: No workaround. |
45 | SBX-114636 | 2 | There was a HDIO_DRIVE_CMD(identify) and NVMe Disk Issue. Impact: Running a sysdump on AWS instance having NVMe disk was giving error as: Root Cause: The primary_disk variable added with new line character that was producing the error in cat command. Steps to Replicate: Spawn a SA instance on AWS using cloud Formation template. Run "sbcDiagnostic.sh 2 " command to collect the sysdump on AWS. | Trimmed the new line character from primary_disk variable to address the issue. Workaround: No workaround. |
46 | SBX-115421 | 2 | Serf Logs and Upgrade marker files are missing from sysDump. Impact: Serf logs and upgrade marker files were missing from sysDump. Root Cause: Capturing only specific log files without * regex. Steps to Replicate: Run sysDump.pl script. | The code is modified to capture all the files including rolled over files. Workaround: No workaround. |
47 | SBX-117736 | 2 | There are GW message parameter sending issues. Impact: The calls that arrived at the SBC with m=text SDP content and are routed to a GSX via GW-GW can be released with disconnect reason CPC_DISC_GW_GW_MSG_PDU_TOO_LONG_FOR_PEER(0xD6) due to the GW-GW message being too large for the GSX to handle. Root Cause: The SBC was sending parameters to the GSX that the GSX could not use and this was making the GW-GW PDU message larger than the GSX could process. Steps to Replicate: Make a call with m=audio and m=text in the SDP of the INVITE and try to route over GW-GW to a GSX. Check the call is successful. The following control should be enabled:
| The code is modified to delete certain parameters that are not required on the GSX to reduce the GW-GW PDU size and avoid calls being released because the PDU is too big. Workaround: Use SMM to delete m=text SDP content coming into the SBX which is potentially routed over GW-GW to a GSX. |
48 | SBX-114969 | 2 | SIPREC: A SIPREC recording failed for REFER call on a D-SBC setup. Impact: SIP recording sessions fail on a D-SBC setup, when the CS call goes through a call transfer scenario and the recording session is to be required on the new leg. Root Cause: The SIPREC on a D-SBC for call transfer scenarios was not supported. Steps to Replicate:
| The code is modified to support SIPREC on the D-SBC for call transfer scenarios. Workaround: None. |
49 | SBX-118108 | 2 | The SBC is not sending SDP offer in outgoing INVITE with all the codecs that are configured in PSP. Impact: The SBC is not sending out INVITE with all configured codecs (passthru + transcodable) when Audio + Text is received. Root Cause: The issue only occurs when the D-SBC ( S/M/T ) set up receives an INVITE from Ingress peer with Audio and T.140 stream. During offer processing, the SBC was checking the transcode capabilities for both Audio and text stream, causing this issue. Steps to Replicate:
| The code is modified to address the issue. Workaround: None. |
50 | SBX-115711 | 2 | Need to update the script to properly do the zip CSAR for SOL3 deployment. Impact: On boarding, the CSAR zip in the SOL3 deployment fails. Root Cause: While zipping with CSAR with python script, it compresses both folders and their files. The unzipping in VNFM expects only the compression of files not the folders. Steps to Replicate: Test the CSAR created in SOL3 deployment. | Fix is given to pack folders without compress, but compress only files. Workaround: Unzip the CSAR and re-zip with Linux zip utility. |
51 | SBX-118042 | 2 | The SBC is not sending Re-INVITE towards Egress side. Impact: On the D-SBC, there was a memory leak in the cluster transcoding capability during UPDATE with preconditions call flow. Root Cause: On the D-SBC, the reference to cluster transcoding capability held in the current working PSP context was being lost, and as a result was leading to memory leak. Steps to Replicate:
The D-SBC would fail to send the re-INVITE to transition to fax. | The code is modified to avoid losing a reference to the current working PSP context cluster transcoding capability memory, by saving it to the pending ACK PSP context and ensuring to free this memory during the offer answer processing. Workaround: No workaround. |
52 | SBX-117081 | 2 | The SBC Dialog scope variable (New Header) not present after an SMM reject. Impact: The SBC SMM has rule to add the Dialog scope variable as new Header in response. But the new header is not getting added. Root Cause: The SMM rule has SMM reject operation followed by another rule with adding a dialog scope variable value in new header. When reject operation is performed, the dialog scope variable is deleted. As a result, this produces the issue. Steps to Replicate:
| The code is modified to remove the dialog scope variables while applying a reject operation. Workaround: None. |
53 | SBX-116256 | 2 | Observed a heap-buffer-overflow on address 0x6260000bf802 at pc 0x56063d63cca4 bp 0x7fe633ce2b00 sp 0x7fe633ce2af8. Impact: A heap-buffer-overflow is observed when Option header with too many spaces or tab is received. Root Cause: When too many space are inserted after Option header. Pdullen is calculated wrongly and include all the spaces also so while doing pre parsing pdulen reaches beyond PDU and leads to coredump. Steps to Replicate: Send option Message with large no spaces or tab such as: | The code is modified to change the startIndex so that it points to Offset Length that is equivalent to the Header length. Now while calculating the PDU length, it is taken from Offset. With these changes, all spaces are taken into consideration and the length is correct. Workaround: None. |
54 | SBX-117236 | 2 | The SBC is sending multiple Update requests towards the Egress when DLRBT is enabled. Impact: The SBC is sending multiple Update requests towards Egress when DLRBT is enabled. Root Cause: When Ingress leg does not support PRACK and egress leg support PRACK and update IENT toward ingress is locally answered due to codec mismatch between Peer PSP and PeerPSP Sent, the SBC is triggering an UPDATE towards egress. Steps to Replicate:
Expected Results: The SBC should not core and process all the update requests. | The code is modified to copy PeerPsp in PeerPspSent so that both are same in this specific scenario. As a result, this does not trigger an update towards egress. Workaround: None. |
55 | SBX-118329 | 2 | A call between CUCM EP and PSTN failed as the SBC is adding additional codecs that are not configured during 18x LRBT play. Impact: The SBC sending all codecs received in the initial INVITE, in the 18x LRBT play. Root Cause: The root cause for this issue is, when TFT and Audio Transparency is enabled, the SBC uses the codec in NSD, during tone play rather from PSP. As part of multi-audio and other bug fixes, the NSD generation for tone Play changed, which is causing this issue. Steps to Replicate:
| The code is modified so when the TFT and Audio Transparency is enabled, the SBC uses the older way to generate the codecs. Workaround: None. |
56 | SBX-117135 | 2 | An unexpected re-INVITE from the SBC towards UAS (Egress Leg) Impact: Unexpected Re-invite from SBC towards UAS (Egress Leg) Root Cause: The issue here is that, the uchRelaxSdpChange flag is not getting RESET after the SBC sent UPDATE to UAS. Due to this, after receiving a 200 OK (for UPDATE) from UAS, the SBC is triggering another UPDATE towards UAS. Steps to Replicate:
| Reset the uchRelaxSdpChange flag after the SBC sends an UPDATE to UAS to address the issue. Workaround: None. |
57 | SBX-118580 | 2 | Observed a leak for the subscribe flow. Impact: When running a subscribe 401 call flow memory leak is found "48 bytes in 1 blocks are definitely lost". Root Cause: cpcZoneNamePtr was not freed properly in the Error condition Steps to Replicate:
| The code is modified to free cpcZoneNamePtr in the Error condition and also for different error scenarios. Workaround: None. |
58 | SBX-115582 | 2 | An SCM coredump is observed after local response of a 200OK for UPDATE received from UAC Impact: An SCM coredump is observed after a local response of 200OK for UPDATE received from UAC Root Cause: After a second Update with sendonly is received from UAC, the SBC aborts the tone and the CC attempts to do cutthru. When NRMA tries to activate resource while doing cutthru, a coredump occurs since no answer is received from the UAS. Steps to Replicate:
| When an Update is received instead of abort tone and cutthru, the SBC swaps the tone resource with the new codec to address the issue. Workaround: None. |
59 | SBX-114693 | 2 | Portfix SBX-114693: Need to Update all the Application code to set the V6 loopback address. Impact: The SBC fails to identify an address as loopback address for an IPV6 call Root Cause: New feature that was added in the 10.1 release exposes this issue. Steps to Replicate: Run a NATed call from IPV6 end point. The call must be established successfully and media should flow from EP1 to EP2 through the SBC. | The code is modified so that the SBC identifies the loopback address for an IPV6 call correctly. Workaround: None. |
60 | SBX-118109 | 2 | EMA: Terminate call is not working from EMA Impact: Terminate call command is failing from EMA Root Cause: When terminate call operation is performed, the terminate call xpath is encoded by the UI and sent to the backend. The backend, however was not decoding the xpath due to which the operation was failing. Steps to Replicate:
The call should get terminated | The code is modified to decode the xpath in the backend. Workaround: No workaround. |
61 | SBX-117842 | 2 | Number Translation criteria was not appearing after importing the file that contains number translation criteria. Impact: Number Translation criteria was not appearing after importing the file that contains number translation criteria. Root Cause: This issue is caused by a feature code check-in, in the SBC release 9.2.3. Steps to Replicate:
Expected Results: The number translation criteria should appear after the import. Observed Issue: The number translation criteria is not appearing after the import. | The code is removed from all occurrences policy/SBXPIPE/SbxNumberTranslationCriteriaEntity.cpp Workaround: No workaround. |
62 | SBX-117382 | 2 | Enabled a full GPU coredump support. Impact: The full coredump collection with large GPU memory foot print fails. Root Cause: There were two root causes:
Steps to Replicate: The steps cannot be reproduced. | The code is modified to:
Workaround: None. |
63 | SBX-117082 | 2 | Failed to create a surrogateRegistrationProfile. Impact: Failed to create a surrogateRegistrationProfile. Root Cause: The max count for the surrogate registration entries was incorrectly initialized to 0, which prevented a configuration from being applied. Steps to Replicate: Configure entries in the surrogateRegistrationProfile and check that the configuration is applied successfully. | The code is modified to correctly initialize the maximum number of surrogate registration entries that can be configured to 25600. Workaround: None. |
64 | SBX-117840 | 2 | The Holiday profile export was failing with an instance not specified error, even though the instance was selected. Impact: While exporting a Profile type Holiday with selected, the profile instance threw an error saying profileinstance is not selected and the profileinstance list should be in format like "1,january,22" but displayed like "1". Root Cause: The code fix in a fix introduced in release 10.1.1 is the root cause. Steps to Replicate: Install the fix build and check whether it lists in format "1,january,22" in profileInstance dropdown for profileType holiday in the EMA UI. | Reverted back the changes made in a fix for release 10.1.1, which displays only the profile Instance name in both EMA and CLI. Workaround: None. |
65 | SBX-118411 | 2 | AddressSanitizer: stack-buffer-overflow on address 0x7febefa8f200. Impact: There is stack-buffer-overflow issue in the SBCPIPE, and due to this issue, it is unable to append new string to the variable. Root Cause: The character array has not initialized to NULL, which leads to a memory overlap. Steps to Replicate: The steps cannot be reproduced. | The code is modified to address the issue. Workaround: None. |
The following known issues exist in these releases.
Issue ID | Sev | Problem Description | Impact/Workaround |
---|---|---|---|
SBX-112554 | 2 | The passthru call is established when mode-set negotiated is different. | Impact Statement: The SBC plays LRBT using AMR-WB full mode-set. Egress Peer in 200 O.K sends a AMR-WB with restricted mode-set =0,1,2,3,4,5. A re-INVITE should be sent to Ingress Peer by the SBC with restricted mode-set=0,1,2,3,4,5 Workaround: None. |
SBX-114522 | 2 | The SBC is clearing the RTP Peer Loss trap during call hold for a non-SBC 5400 setup | Impact Statement: The SBC is clearing RTP Peer Loss trap during call hold. However, after the call is resumed, the trap will be generated again if media flow continues be in silence. Workaround: No workaround. |
The following limitations exist in this release.
Category | Limitations |
---|---|
SBC SWe | The EMS identifies the nodes based on the VNFC-ID. While instantiating SBC/PSX cloud nodes, ensure that you use a unique VNFC-ID only. If you reuse an existing VNFC-ID, EMS treats this as a re-registration request and overwrites the existing data on the cloud node. |
The physical NIC connectivity must be in active state at the hypervisor level before starting the SWe instance on the SBC SWe platforms. In case of SWe instance with SR-IOV interfaces, manual restart of the SWe instance is required if physical NIC connectivity goes down while the instance is in progress. | |
While configuring the SBC SWe Cloud instances, the CLIs commits successfully even if any metaVariable provided is incorrect. The SBC SWe Cloud instance cannot validate the CLIs, as the CDB configuration file is stored in the OAM Node and is shared among all the other SBC SWe Cloud instances in the cluster. | |
When upgrading SBC SWe cloud instances from any release prior to 9.1 to release 10.0, you must update your Heat template userdata section to include mandatory SSH key information. An issue in OpenStack requires that you use the stack-update process rather than re-launch after updating the template, which leads to a new UUID for the instance. As a result, you must regenerate and apply new license bundles to the upgraded instances during the upgrade. Refer to Upgrading SBC SWe N:1 HA Nodes on OpenStack using Heat Templates for the relevant procedure. | |
D-SBC | The Antitrombone feature is not supported on the D-SBC. |
S-SBC | Editing IP Interface is not reflected in the if configuration (ifConfig). This behavior is observed only on the S-SBC when action is set to "dryup" mode on the IP Interface. The IP address changes are not updated in the kernel and will not be displayed when ifconfig linux command is executed. In case of S-SBC, if the ipInterface configuration needs to be modified and if the action is set to "dryup" in ipInterface configuration, it must be set to "force" before disabling the ipInterface and making any changes. |
SBC 7000 | A LSWU on an SBC 7000 should only be performed when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down. Contact Ribbon Support immediately. |
SBC Microservices | The following functionalities are not supported with SBC Microservices:
|
EMA GUI | Due to a known EMA GUI issue, it can take up to 10 minutes to process and commit an SMM profile. This may be seen when the profile contains the max of 256 rules within it and provisioning of the SMM profile is being done using the EMA GUI. This will be fixed in a future release. |
SNMP traps | The ACL is not installed to configure SNMP traps for accepting traffic. A dynamic ACL is added to configure SNMP traps. An ACL must be installed for SNMP traps for accepting traffic. |