[asterisk-commits] russell: branch group/security_events r246101 - /team/group/security_events/c...
SVN commits to the Asterisk project
asterisk-commits at lists.digium.com
Wed Feb 10 11:24:00 CST 2010
Author: russell
Date: Wed Feb 10 11:23:56 2010
New Revision: 246101
URL: http://svnview.digium.com/svn/asterisk?view=rev&rev=246101
Log:
Save off some stuff that was in my working copy so I can resolve a conflict in the branch
Modified:
team/group/security_events/channels/chan_sip.c
Modified: team/group/security_events/channels/chan_sip.c
URL: http://svnview.digium.com/svn/asterisk/team/group/security_events/channels/chan_sip.c?view=diff&rev=246101&r1=246100&r2=246101
==============================================================================
--- team/group/security_events/channels/chan_sip.c (original)
+++ team/group/security_events/channels/chan_sip.c Wed Feb 10 11:23:56 2010
@@ -205,6 +205,67 @@
*/
+/*!
+ * \page SIPsecurityevents SIP Security Events
+ *
+ * \section intro Introduction
+ *
+ * This page covers the status of the development of security events support in
+ * chan_sip. Prototypes for functions that have been added can be found by
+ * searching for the "Security Event Handling" heading.
+ *
+ * \section events Security Events (TODO)
+ *
+ * - FAILED_ACL
+ * - added report_failed_acl() function
+ * - almost done
+ * - Make sure it is used everywhere ACLs are checked
+ *
+ * - INVAL_ACCT_ID
+ * - added report_invalid_peer() function
+ * - not yet used anywhere
+ * - needs to be called everywhere where we do a lookup by name and no
+ * peer (user, really) is found.
+ *
+ * - SESSION_LIMIT
+ * - should report this when a request is denied due to a call limit setting
+ *
+ * - REQ_NO_SUPPORT
+ * - should report this if we receive a request we do not support
+ *
+ * - REQ_NOT_ALLOWED
+ * - should report this if we receive a request that we understand, but
+ * do not allow (example?)
+ *
+ * - REQ_BAD_FORMAT
+ * - report this on a request parse error
+ *
+ * - SUCCESSFUL_AUTH
+ * - report this after successful authentication, but only after the
+ * security events infrastructure fully supports non-error events
+ *
+ * - UNEXPECED_ADDR
+ * - report this if we get a request from an unexpected address. Examples
+ * would be if we try do a peer lookup by IP and get no result, or if we
+ * get a request for an active Call-ID from an unexpected source IP/port.
+ *
+ * - CHAL_RESP_FAILED
+ * - report this if authentication fails
+ *
+ * \section events2 Security Events (Done)
+ *
+ * - MEM_LIMIT
+ * - nothing needed
+ *
+ * - LOAD_AVG
+ * - nothing needed
+ *
+ * - AUTH_METHOD_NOT_ALLOWED
+ * - nothing needed
+ *
+ * - INVAL_PASSWORD
+ * - nothing needed (we use INVAL_CHAL_RESP here)
+ */
#include "asterisk.h"
ASTERISK_FILE_VERSION(__FILE__, "$Revision$")
@@ -2562,7 +2623,6 @@
const enum sip_transport sip_transport);
static void report_failed_acl(const struct sip_peer *peer, const struct sip_pvt *pvt,
const struct sockaddr_in *sin_remote, const char *acl_name);
-/*! XXX \todo Use this in the proper places in chan_sip */
static void attribute_unused report_invalid_peer(const char *peer_name, const struct sip_pvt *pvt,
const struct sockaddr_in *sin_remote);
@@ -5260,6 +5320,12 @@
if (!p && (realtime || devstate_only)) {
p = realtime_peer(peer, sin, devstate_only);
}
+
+#if 0
+ if (!p && (which_obects & FINDUSERS)) {
+ report_invalid_peer(...);
+ }
+#endif
return p;
}
More information about the asterisk-commits
mailing list