[asterisk-dev] [Code Review] SIP: peer matching by address with TCP/TLS
Russell Bryant
russell at digium.com
Fri Sep 4 13:25:05 CDT 2009
-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviewboard.asterisk.org/r/354/#review1056
-----------------------------------------------------------
/trunk/channels/chan_sip.c
<https://reviewboard.asterisk.org/r/354/#comment2590>
You are changing the behaviour of this code in an important way. With the change you made, it will match a peer with insecure=port set on the first pass. The intention is that we consider all appropriate peers without doing the insecure=port check first, before trying again for a less specific match.
- Russell
On 2009-09-04 12:29:10, David Vossel wrote:
>
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviewboard.asterisk.org/r/354/
> -----------------------------------------------------------
>
> (Updated 2009-09-04 12:29:10)
>
>
> Review request for Asterisk Developers.
>
>
> Summary
> -------
>
> Using both the ip address and port number to peer match a connection coming in over tcp does not work. A work around for this issue was committed a few months ago which used the contact header to peer match tcp connections. This is incorrect. Instead, peer matching for tcp connections should be done by ip address only.
>
> This patch removes the contact header matching logic and adds logic to match all tcp/tls connections by ip only.
>
>
> Diffs
> -----
>
> /trunk/channels/chan_sip.c 216506
>
> Diff: https://reviewboard.asterisk.org/r/354/diff
>
>
> Testing
> -------
>
> tested invites over tcp, verified peer matching by ip works correctly.
>
>
> Thanks,
>
> David
>
>
More information about the asterisk-dev
mailing list