[asterisk-bugs] [JIRA] (ASTERISK-21433) Add analogous support for 'alwaysauthreject' to chan_gulp and top level security settings

Matt Jordan (JIRA) noreply at issues.asterisk.org
Mon Apr 15 16:21:01 CDT 2013


Matt Jordan created ASTERISK-21433:
--------------------------------------

             Summary: Add analogous support for 'alwaysauthreject' to chan_gulp and top level security settings
                 Key: ASTERISK-21433
                 URL: https://issues.asterisk.org/jira/browse/ASTERISK-21433
             Project: Asterisk
          Issue Type: New Feature
      Security Level: None
          Components: Channels/chan_gulp
            Reporter: Matt Jordan


One of the more highly used (and frequently accused) features in {{chan_sip}} is the {{alwaysauthreject}} feature, which helps to prevent attackers from enumerating possible endpoints in Asterisk. The formula should go as follows:

# Inbound malicious request hits Asterisk
# Asterisk challenges the inbound request
# Inbound malicious request hits Asterisk with challenge response
# Asterisk determines that this request doesn't match a valid endpoint and returns a "403", regardless of the actual reason it would reject the request

We need an analogous feature in {{chan_gulp}}. This will require the following:

* A new "global security" object for sorcery. This should include both alwaysauthreject, as well as an ACL object (currently provided by res_sip_acl). Note that ACLs should be definable both at a 'global level', as well as for endpoints.
* Creation of a new SIP module that provides security support for the SIP stack (say, {{res_sip_security}}). This should parse the global security options out and enable them.
* Apply the global ACLs to all inbound requests. This can occur either in {{res_sip_security}} or in a separate module that builds on a framework that module provides.
* When {{alwaysauthreject}} is enabled, create a 'bogus' endpoint that will match all unmatched request attempts. This should have a password that can never be matched (see chan_sip in 11.3.0+) and will always cause inbound requests to fail. This can occur either in {{res_sip_security}} or in a separate module that builds on a framework that module provides.

Note that items such as the SIP Security Framework will have to also be ported over to chan_gulp, so having a security module that provides security services is probably needed.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.asterisk.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira



More information about the asterisk-bugs mailing list