Skip to content
Snippets Groups Projects
  1. Dec 04, 2017
    • Richard Mudgett's avatar
      security-events: Fix SuccessfulAuth using_password declaration. · 8536a09b
      Richard Mudgett authored
      The SuccessfulAuth using_password field was declared as a pointer to a
      uint32_t when the field was later read as a uint32_t value.  This resulted
      in unnecessary casts and a non-portable field value reinterpret in
      main/security_events.c:add_json_object().  i.e., It would work on a 32 bit
      architecture but not on a 64 bit big endian architecture.
      
      Change-Id: Ia08bc797613a62f07e5473425f9ccd8d77c80935
      8536a09b
  2. Oct 27, 2016
    • Corey Farrell's avatar
      Remove ASTERISK_REGISTER_FILE. · a6e5bae3
      Corey Farrell authored
      ASTERISK_REGISTER_FILE no longer has any purpose so this commit removes
      all traces of it.
      
      Previously exported symbols removed:
      * __ast_register_file
      * __ast_unregister_file
      * ast_complete_source_filename
      
      This also removes the mtx_prof static variable that was declared when
      MTX_PROFILE was enabled.  This variable was only used in lock.c so it
      is now initialized in that file only.
      
      ASTERISK-26480 #close
      
      Change-Id: I1074af07d71f9e159c48ef36631aa432c86f9966
      a6e5bae3
  3. Aug 13, 2015
    • Kevin Harwell's avatar
      chan_sip.c: wrong peer searched in sip_report_security_event · 43bdddfc
      Kevin Harwell authored
      In chan_sip, after handling an incoming invite a security event is raised
      describing authorization (success, failure, etc...). However, it was doing
      a lookup of the peer by extension. This is fine for register messages, but
      in the case of an invite it may search and find the wrong peer, or a non
      existent one (for instance, in the case of call pickup). Also, if the peers
      are configured through realtime this may cause an unnecessary database lookup
      when caching is enabled.
      
      This patch makes it so that sip_report_security_event searches by IP address
      when looking for a peer instead of by extension after an invite is processed.
      
      ASTERISK-25320 #close
      
      Change-Id: I9b3f11549efb475b6561c64f0e6da1a481d98bc4
      43bdddfc
  4. Apr 13, 2015
    • Matt Jordan's avatar
      git migration: Refactor the ASTERISK_FILE_VERSION macro · 4a582616
      Matt Jordan authored
      Git does not support the ability to replace a token with a version
      string during check-in. While it does have support for replacing a
      token on clone, this is somewhat sub-optimal: the token is replaced
      with the object hash, which is not particularly easy for human
      consumption. What's more, in practice, the source file version was often
      not terribly useful. Generally, when triaging bugs, the overall version
      of Asterisk is far more useful than an individual SVN version of a file. As a
      result, this patch removes Asterisk's support for showing source file
      versions.
      
      Specifically, it does the following:
      
      * Rename ASTERISK_FILE_VERSION macro to ASTERISK_REGISTER_FILE, and
        remove passing the version in with the macro. Other facilities
        than 'core show file version' make use of the file names, such as
        setting a debug level only on a specific file. As such, the act of
        registering source files with the Asterisk core still has use. The
        macro rename now reflects the new macro purpose.
      
      * main/asterisk:
        - Refactor the file_version structure to reflect that it no longer
          tracks a version field.
        - Remove the "core show file version" CLI command. Without the file
          version, it is no longer useful.
        - Remove the ast_file_version_find function. The file version is no
          longer tracked.
        - Rename ast_register_file_version/ast_unregister_file_version to
          ast_register_file/ast_unregister_file, respectively.
      
      * main/manager: Remove value from the Version key of the ModuleCheck
        Action. The actual key itself has not been removed, as doing so would
        absolutely constitute a backwards incompatible change. However, since
        the file version is no longer tracked, there is no need to attempt to
        include it in the Version key.
      
      * UPGRADE: Add notes for:
        - Modification to the ModuleCheck AMI Action
        - Removal of the "core show file version" CLI command
      
      Change-Id: I6cf0ff280e1668bf4957dc21f32a5ff43444a40e
      4a582616
  5. Nov 19, 2014
  6. Aug 08, 2014
  7. Apr 11, 2014
  8. May 17, 2013
  9. Mar 27, 2013
    • Matthew Jordan's avatar
      AST-2013-003: Prevent username disclosure in SIP channel driver · 0ffce56f
      Matthew Jordan authored
      When authenticating a SIP request with alwaysauthreject enabled, allowguest
      disabled, and autocreatepeer disabled, Asterisk discloses whether a user
      exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. The
      information is disclosed when:
       * A "407 Proxy Authentication Required" response is sent instead of a
         "401 Unauthorized" response
       * The presence or absence of additional tags occurs at the end of "403
         Forbidden" (such as "(Bad Auth)")
       * A "401 Unauthorized" response is sent instead of "403 Forbidden" response
         after a retransmission
       * Retransmission are sent when a matching peer did not exist, but not when a
         matching peer did exist.
      
      This patch resolves these various vectors by ensuring that the responses sent
      in all scenarios is the same, regardless of the presence of a matching peer.
      
      This issue was reported by Walter Doekes, OSSO B.V. A substantial portion of
      the testing and the solution to this problem was done by Walter as well - a
      huge thanks to his tireless efforts in finding all the ways in which this
      setting didn't work, providing automated tests, and working with Kinsey on
      getting this fixed.
      
      (closes issue ASTERISK-21013)
      Reported by: wdoekes
      Tested by: wdoekes, kmoore
      patches:
        AST-2013-003-1.8 uploaded by kmoore, wdoekes (License 6273, 5674)
        AST-2013-003-10 uploaded by kmoore, wdoekes (License 6273, 5674)
        AST-2013-003-11 uploaded by kmoore, wdoekes (License 6273, 5674)
      ........
      
      Merged revisions 384003 from http://svn.asterisk.org/svn/asterisk/branches/11
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@384019 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      0ffce56f
  10. Feb 12, 2013
  11. Jul 31, 2012
    • Kinsey Moore's avatar
      Clean up chan_sip · e5210366
      Kinsey Moore authored
      This clean up was broken out from
      https://reviewboard.asterisk.org/r/1976/ and addresses the following:
       - struct sip_refer converted to use the stringfields API.
       - sip_{refer|notify}_allocate -> sip_{notify|refer}_alloc to match
         other *alloc functions.
       - Replace get_msg_text, get_msg_text2 and get_pidf_body -> No, not
         get_pidf_msg_text_body3 but get_content, to match add_content.
       - get_body doesn't get the request body, renamed to get_content_line.
       - get_body_by_line doesn't get the body line, and is just a simple if
         test. Moved code inline and removed function.
       - Remove camelCase in struct sip_peer peer state variables,
         onHold -> onhold, inUse -> inuse, inRinging -> ringing.
       - Remove camelCase in struct sip_request rlPart1 -> rlpart1,
         rlPart2 -> rlpart2.
       - Rename instances of pvt->randdata to pvt->nonce because that is what
         it is, no need to update struct sip_pvt because _it already has a
         nonce field_.
       - Removed struct sip_pvt randdata stringfield.
       - Remove useless (and inconsistent) 'header' suffix on variables in
         handle_request_subscribe.
       - Use ast_strdupa on Event header in handle_request_subscribe to avoid
         overly complicated strncmp calls to find the event package.
       - Move get_destination check in handle_request_subscribe to avoid
         duplicate checking for packages that don't need it.
       - Move extension state callback management in handle_request_subscribe
         to avoid duplicate checking for packages that don't need it.
       - Remove duplicate append_date prototype.
       - Rename append_date -> add_date to match other add_xxx functions.
       - Added add_expires helper function, removed code that manually added
         expires header.
       - Remove _header suffix on add_diversion_header (no other header adding
         functions have this).
       - Don't pass req->debug to request handle_request_XXXXX handlers if req
         is also being passed.
       - Don't pass req->ignore to check_auth as req is already being passed.
       - Don't create a subscription in handle_request_subscribe if
         p->expiry == 0.
       - Don't walk of the back of referred_by_name when splitting string in
         get_refer_info
       - Remove duplicate check for no dialog in handle_incoming when
         sipmethod == SIP_REFER, handle_request_refer checks for that.
      
      Review: https://reviewboard.asterisk.org/r/1993/
      Patch-by: gareth
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@370636 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      e5210366
  12. Jul 16, 2012
  13. Jun 15, 2012
    • Kevin P. Fleming's avatar
      Multiple revisions 369001-369002 · 166b4e2b
      Kevin P. Fleming authored
      ........
        r369001 | kpfleming | 2012-06-15 10:56:08 -0500 (Fri, 15 Jun 2012) | 11 lines
        
        Add support-level indications to many more source files.
        
        Since we now have tools that scan through the source tree looking for files
        with specific support levels, we need to ensure that every file that is
        a component of a 'core' or 'extended' module (or the main Asterisk binary)
        is explicitly marked with its support level. This patch adds support-level
        indications to many more source files in tree, but avoids adding them to
        third-party libraries that are included in the tree and to source files
        that don't end up involved in Asterisk itself.
      ........
        r369002 | kpfleming | 2012-06-15 10:57:14 -0500 (Fri, 15 Jun 2012) | 3 lines
        
        Add a script to enable finding source files without support-levels defined.
      ........
      
      Merged revisions 369001-369002 from http://svn.asterisk.org/svn/asterisk/branches/1.8
      ........
      
      Merged revisions 369005 from http://svn.asterisk.org/svn/asterisk/branches/10
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@369013 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      166b4e2b
  14. Apr 16, 2012
    • Michael L. Young's avatar
      Add IPv6 address support to security events framework. · abf40d9b
      Michael L. Young authored
      The current Security Events Framework API only supports IPv4 when it comes to
      generating security events.  This patch does the following:
      
      * Changes the Security Events Framework API to support IPV6 and updates
        the components that use this API.
      
      * Eliminates an error message that was being generated since the current
        implementation was treating an IPv6 socket address as if it was IPv4.
      
      * Some copyright dates were updated on files touched by this patch.
      
      (closes issue ASTERISK-19447) 
      Reported by: Michael L. Young 
      Tested by: Michael L. Young 
      Patches: 
        security_events_ipv6v3.diff uploaded by Michael L. Young (license 5026)
      
      Review: https://reviewboard.asterisk.org/r/1777/
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@362200 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      abf40d9b
  15. Feb 28, 2012
  16. Sep 22, 2011
Loading