[asterisk-bugs] [Asterisk 0012398]: [patch] : support for new Nortel i2050 softphone
noreply at bugs.digium.com
noreply at bugs.digium.com
Tue Apr 15 11:02:58 CDT 2008
A NOTE has been added to this issue.
======================================================================
http://bugs.digium.com/view.php?id=12398
======================================================================
Reported By: c_hans
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 12398
Category: Channels/chan_unistim
Reproducibility: always
Severity: minor
Priority: normal
Status: feedback
Asterisk Version: SVN
SVN Branch (only for SVN checkouts, not tarball releases): trunk
SVN Revision (number only!): 113840
Disclaimer on File?: N/A
Request Review:
======================================================================
Date Submitted: 04-09-2008 13:57 CDT
Last Modified: 04-15-2008 11:02 CDT
======================================================================
Summary: [patch] : support for new Nortel i2050 softphone
Description:
New i2050 softphone send a different hardware address (0x3132 instead of
0x3138).
Bug reported by Tom Cross of X-Force Research / IBM Internet Security
Systems
Thank you.
======================================================================
----------------------------------------------------------------------
c_hans - 04-15-08 11:02
----------------------------------------------------------------------
Yes, the MAC address is still after these two bytes.
The Wireshark source only tell us
0x9a Basic Manager Phone
0x07 Hardware ID
Maybe 0x31 0x32/38 report a version or some hardware identification.
Anyway, the code parsing the mac address use a fixed position.
packet_recv_mac_addr is only used to classify the packet. We now just
ignore these two bytes.
Issue History
Date Modified Username Field Change
======================================================================
04-15-08 11:02 c_hans Note Added: 0085506
======================================================================
More information about the asterisk-bugs
mailing list