Yealink T5x Handsets No longer Auto-Provision or call RemotePB scripts via Authenticated HTTPS

I have a couple of PBXact v15 installations running Yealink T5x Handsets (FW: 96.85.x.x).

  • These handsets have always provisioned out of the box/from factory reset via Authenticated HTTPS (using Yealink redirection service) no problem.

  • These handsets have always called a custom Remote Phonebook script to show & enable dialling Contact manager entries via Authenticated HTTPS no problem.

Since sometime last week (I think), the both these ‘Authenticated HTTPS’ based communications seem to have stopped working. Nothing has changed with the general setup of these installations. I do check & apply any new PBXact System/Module updates quite regularly & I did do this sometime last week (which possibly stopped these functions working as they did previously).

If I specify both the HTTPS-based Provisioning URL & RemotePB script URL in a Web Browser, the PBXacts respond no problem, it just doesn’t do the same from the Yealink handsets themselves.

I have switched a single Yealink handset on BOTH installations to use ‘Authenticated HTTP’ & hey-presto, all is working again.

Does anyone know if something changed in a module update recently that could have broken the ‘Authenticated HTTPS’ communications between PBXact & Yealink handsets ?

PS. I have found some forum articles that suggest Authenticated HTTPS with Yealink handsets didn’t work previously, however, it’s always worked for me on these v15 installations (until now).

Some recent updates which ‘might’ be relevant;
image
image
image

Also for reference;
image

image

You’re using let’s encrypt? It’s probably related to the recent expiry of a root cert. Is there a phone firmware update to address it?

Hi Lorne,

Yes, I am using LE on both systems.

Actually, I believe even EPM lists an update to FW 96.86.x.x for those Yealink handsets.
image
I will install that & see if it restores ‘Authenticated HTTPS’ communications on those handsets/systems. I’ll post the outcome once I’ve tried it (probably tomorrow now as its 22:38 here in the uk).

Yealink has not released any firmware to handle the LE issues.

On top of that, firmware in EPM is typically months behind anything Yealink releases.

Umm @lgaetz, did Sangoma get specially released firmware? Because the last released public firmware is still the X.86.0.18 / X.86.0.23 bundle. FYI, that firmware is from July, even if the update date is newer.

And that firmware comes with a big warning that you can no longer roll back beyond them once you upgrade to them. Also, depending on what firmware you were on first, you can possibly not go directly to X.86.0.23.

Several Yealink models have been added in batches in the previous month’s, but I’m not aware of anything special about the firmware we’re publishing. @kgupta1 can you comment?

Please ensure that your pbxact has the latest module for example sysadmin latest is v15.0.21.89.

Regarding Yealink firmware - Yes while adding new models , We have got the firmware list from Yealink for other models with URL to download the firmware and the same we have recently updated into the EPM. Please find below the latest firmware list from EPM.

Version=1.22

SIP-T18P        18.0.0.80
SIP-T19P        31.72.0.75
SIP-T19PE2      53.84.0.125
SIP-T20P        9.73.0.50
SIP-T21E2       52.84.0.125
SIP-T21P        34.72.0.75
SIP-T21PE2      52.84.0.125
SIP-T22P        7.73.0.50
SIP-T23P        44.84.0.125
SIP-T23G        44.84.0.125
SIP-T26P        6.73.0.50
SIP-T27P        45.81.0.70
SIP-T27G        69.84.0.125
SIP-T28P        2.73.0.50
SIP-T29G        46.83.0.120
SIP-T31P        124.86.0.20
SIP-T32G        32.70.1.33
SIP-T33G        124.86.0.20
SIP-T38G        38.70.1.33
SIP-T40P        54.84.0.125
SIP-T41P        36.83.0.120
SIP-T41S        66.86.0.15
SIP-T42G        29.83.0.120
SIP-T42S        66.86.0.15
SIP-T43U        108.86.0.20
SIP-T46G        28.83.0.120
SIP-T46S        66.86.0.15
SIP-T48G        35.83.0.120
SIP-T48S        66.86.0.15
SIP-T49G        51.80.0.100
SIP-T46U        108.86.0.20
SIP-T53W        96.86.0.33
SIP-T54W        96.86.0.33
SIP-T57W        96.86.0.33
SIP-T58A-CAM    58.85.0.5


VP-2009 Contact Yealink
VP530   23.70.0.40

CP860   37.81.0.10

W52P    25.81.0.60
W56P    25.81.0.60

VP59    91.85.0.50
1 Like

Ok, so did some testing today using a single Yealink handset on the PBXact as detailed in my original post at the top of this thread;

Yealink T54W - FW: 96.85.0.49 (Part of EPM Yealink FW v1.21)

  • Authenticated HTTPS --> Auto-Provision: Failed / RemotePB: Failed

  • Authenticated HTTP --> Auto-Provision: Success / RemotePB: Success

Yealink T54W - FW: 96.86.0.33 (Part of EPM Yealink FW v1.22)

  • Authenticated HTTPS --> Auto-Provision: Success / RemotePB: Success

  • Authenticated HTTP --> Auto-Provision: Success / RemotePB: Success

The upshot is that the latest EPM supplied Yealink firmware seems to resolve the problem (for the T54W I tested at least).

I also have some Yealink DECT Handsets (W53H/W56H/W59R) connected to a W60B (using FW 77.85.0.25) which exhibit the same issue. The W60B is listed in EPM, however, I don’t see any reference to it (or its Handsets) in the EPM Firmware package - Is this an oversight ?

If it is an oversight, it has been for years. A one shot client I dealt with a few years ago added some of those and it was missing then. But they were decently new then, I just assumed they had not yet been agreed to by Yealink.

The Wiki says this;
image
image

but it’s unclear if/how that relates to Firmware being included within the EPM Firmware Package.

I realise I can download direct from Yealink, however, as you alluded previously, there does appear to be some version numbering differences between what the EPM FW Package contains & what’s on the Yealink support page. From my testing above, it appears I need FW xx.86.x.xx for all Yealink handset models (& the W60B only has xx.85.x.xx available currently).

So just to clarify, is the general consensus that this issue relates to an invalid/expired LE certificate somewhere within their chain, & if so, would the problem go away if I used a commercial certificate from another provider (eg. GoDaddy, SSL247 etc.) ?

AND, does is not seem feasible that LE are likely to fix this invalid/expired certificate in the near future (even though that’s no help if all these handsets have issues in the meantime) ??

well it is my assumption. I dunno about general consensus.

Almost certainly.

I’m leaning to no.

This seems to still be an issue with discontinued Yealink Phones such as T19P E2 or W60B. Yealink hasn’t made a new firmware version for these models for quite some time and now if one of these is reset to default factory settings it won’t communicate with the Endpoint Manager.

That’s correct - I’ve had to manually update the firmware in each of the T54W & T57W handsets to xx.86.x.xx which seems to resolve the problem.

For the W60B’s, I’ve had to change their configs to use ‘Authenticated HTTP’ (instead of HTTPS) for provisioning & Remote PB URLs, until either the invalid/expired LE Certificate is resolved and/or a v86 firmware is available for that model (These devices are on an internal Subnet/Site-to-Site VPN tunnel, so HTTP is not a deal-breaker for me).

I guess if these options don’t work for you, another would be to use an alternative Certificate provider.

1 Like

This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.