[asterisk-bugs] [JIRA] (ASTERISK-28688) Matching SIP TCP peer by IP with insecure=port regression

Joshua C. Colp (JIRA) noreply at issues.asterisk.org
Tue Jan 14 05:03:25 CST 2020


    [ https://issues.asterisk.org/jira/browse/ASTERISK-28688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=249348#comment-249348 ] 

Joshua C. Colp commented on ASTERISK-28688:
-------------------------------------------

I should also add that certified 16.3 has been released, and certified 13.21 is unlikely to receive any further updates or releases.

> Matching SIP TCP peer by IP with insecure=port regression
> ---------------------------------------------------------
>
>                 Key: ASTERISK-28688
>                 URL: https://issues.asterisk.org/jira/browse/ASTERISK-28688
>             Project: Asterisk
>          Issue Type: Bug
>      Security Level: None
>          Components: Channels/chan_sip/TCP-TLS
>    Affects Versions: 13.21.1
>            Reporter: rsw686
>
> The changes in ASTERISK-27457 create a regression where invites from a SIP TCP peer are matched by IP and port even though insecure=port,invite is configured. Reverting this commit on Asterisk 13.21-cert5 restores the expected behavior. Prior to this I was running 13.8-cert4 which correctly matched a TCP peer by IP ignoring the port.



--
This message was sent by Atlassian JIRA
(v6.2#6252)



More information about the asterisk-bugs mailing list