[asterisk-dev] Kill the user, kill the user!

John Todd jtodd at loligo.com
Fri Dec 7 13:25:54 CST 2007


At 10:31 AM -0800 2007/12/7, Luigi Rizzo wrote:
>On Fri, Dec 07, 2007 at 11:05:57AM -0600, Tilghman Lesher wrote:
>>  On Thursday 06 December 2007 16:48:43 Patrick wrote:
>>  > On Thu, 2007-12-06 at 14:04 -0800, Ryan Mitchell wrote:
>>  > > To raise an issue that's come up a few times before, instead of
>>  > > checking user then ip/port, why not check ip/port first then user?
>>  >
>>  > How about making it configurable per peer?
>>
>>  That doesn't make any sense.  The whole purpose of this code is to FIND
>>  the peer.  By the time you know which peer, it's too late.
>
>i was about to make the same comment in my previous email,
>however there is perhaps a partially related per-peer setting,
>namely allow/disallow/assign different weights to each
>match criteria on a per-peer basis.
>
>E.g. for certain peers who have little privilege (e.g.
>cannot place external calls or cannot use toll services)
>you might decide to allow IP/port matching even if not
>authenticated; for other peers you could allow a match only
>basing on some more reliable credential. And so on.
>
>This requires a bit of thought but it is probably doable.
>
>cheers
>luigi

I will concur with Luigi's comments.

I frequently have situations where I need to match based _only_ on IP 
address/port (or IP address range, even more of a headache) and I 
also need to match on user credentials for any hosts not in those 
ranges.  Think of this situation, which for me is quite common:

  1) I have a VoIP provider who sends me calls, but doesn't understand 
authentication.  They have a /24 from which INVITEs originate to 
ranges of DIDs on my Asterisk system.

  2) I have a dumb VoIP device that sits at the house of the CEO that 
doesn't understand authentication.  I know the /24 of his 
DHCP-allocated network range, but can't anticipate what address the 
INVITEs will come from.

  3) I have a set of users who roam with their smartphones and can 
appear anywhere on the Internet.  These users require passwords for 
authentication to my system to receive/make calls on their discreet 
extensions.

Is this easily possible with the new methodology?  Because it's been 
a constant headache in the past with getting the configuration right 
for situations like this.

JT



More information about the asterisk-dev mailing list