[Asterisk-Dev] Transfer of variables to remote servers (new subject)

Olle E. Johansson oej at edvina.net
Tue Apr 20 23:51:05 MST 2004


John Todd wrote:
> At 10:14 PM +0200 on 4/20/04, Olle E. Johansson wrote:
> 
>> John Todd wrote:
>>
>>> more significant and vexing problem of transferring values OUT of a 
>>> particular server to a remote server.
>>>
>>> I am uncertain how this should be created, actually.  How do you hand 
>>> things off in SIP?  How about IAX2?  MGCP?  Zap?(1) How do you read 
>>> them from the other side?  How do you refuse them?(2)  Can you get a 
>>> list of the attached values at the other end?(3)
>>
>>
>> I would suggest we concentrate on Asterisk to asterisk for this 
>> functionality.
>> Which suggest IAX2.
>> There need to be a "trust" concept - do we trust data from this 
>> server, or not?
>>
>>> This would be _TREMENDOUSLY_ powerful if it could be well designed 
>>> and had even basic functionality in SIP and IAX2.  Think of this very 
>>> small variable name example: "__caller-is-ceo"
>>
>> For SIP, I can't recall an existing protocol extension. There's a lot of
>> work going on in the 3G space so maybe there's functionality for this
>> to be found there - metadata on a call to be handled only between one
>> provider's trusted servers.

> 
> I don't see a need for "trust" in IAX2 or any other channel types, 
> actually.  That can be regulated by sending the calls from certain 
> "trusted" providers to different contexts, which have different values 
> of "trust" for incoming variables.  This is already gated on 
> username/password/IP address in the [channel].conf file, right?
> 
> Also, based on the contents of some "known" variables, we could do some 
> GotoIf booleans to move to more-or-less trusted sub-contexts or 
> extensions.  This is a kludge, if we're using it for "trust", but it 
> will undoubtedly be done depending on the style of the administrator. 
> This is essentially putting layers of "passwords" into call transfers, 
> which implies that we have end-to-end encryption (cough, cough.)  
> However, I am firmly of the belief that variable passing should not be 
> directly coupled to end-to-end crypto, so don't let that hold things 
> up...  We already have a method to negotiate trust between endpoints, 
> and that method supports multiple levels of security already.
Ok, agreed. We have a trust mechanism. Then we need support for it
in the protocol - does it exist or not? I'm not familiar with the
inner workings of IAX2...

/O



More information about the asterisk-dev mailing list