Am 17.04.2011 13:54, schrieb Juha Heinanen:
> Iñaki Baz Castillo writes:
>
>> Depending on our topology we can just ask for authentication for every
>> in-dialog request (unless it comes from a trusted node as a PSTN gw)
>> but without trying to check the identity of the in-dialog request
>> ori
Iñaki Baz Castillo writes:
> Yes. But IMHO this is typicall in any PBX environment in which users
> have short extensions (200, 201...) and the PSTN gws are not aware of
> them.
you certainly don't need b2bua in order to map short extension numbers
to e.164 numbers. that is very easy to handle i
2011/4/17 Juha Heinanen :
> Iñaki Baz Castillo writes:
>
>> I've never seen a PSTN gw properly handling a REFER, neither I think a
>> PSTN gw should handle it (but a B2BUA/PBX) between the UA and the PSTN
>> gw(s).
>
> inaki,
>
> your suggestion would mean that proxy would need to route every call
Iñaki Baz Castillo writes:
> I've never seen a PSTN gw properly handling a REFER, neither I think a
> PSTN gw should handle it (but a B2BUA/PBX) between the UA and the PSTN
> gw(s).
inaki,
your suggestion would mean that proxy would need to route every call
between sip ua and pstn gw via a b2bu
Iñaki Baz Castillo writes:
> I've never seen a PSTN gw properly handling a REFER, neither I think a
> PSTN gw should handle it (but a B2BUA/PBX) between the UA and the PSTN
> gw(s).
i don't see any problem if gw charges the call based on referred-by that
proxy has verified. i think that even cis
2011/4/17 Juha Heinanen :
> lets say that a sip ua has dialog established with pstn gw and the sip
> ua sends refer to pstn gateway for the purpose of transferring the call
> to another pstn destination. in that case, referred-by uri is used for
> accounting of the new pstn leg.
I've never seen a
Iñaki Baz Castillo writes:
> Depending on our topology we can just ask for authentication for every
> in-dialog request (unless it comes from a trusted node as a PSTN gw)
> but without trying to check the identity of the in-dialog request
> originator. Well, the identity is asserted by the proxy a
2011/4/17 Juha Heinanen :
> if refer does not contain referred-by header, then there is no other
> choice than to refuse it. otherwise (unless you keep call state) you
> don't have any chance to know who sent the refer and what rights the
> sender might have.
Keeping call state within a proxy is
Iñaki Baz Castillo writes:
> Hi Juha, Referred-By header is not part of REFER specification but an
> extension (RFC 3892) and it's not mandatory:
>
> 2.1. Referrer Behavior
>
>A UA sending a REFER request (a referrer) MAY provide a Referred-By
>header field value in the request.
if r
2011/4/16 Juha Heinanen :
>> - Later alice sends a REFER or a re-INVITE. Note that the request
>> would contain "From: sip:2...@domain.org" (even if the AoR of alice us
>> "sip:al...@domain.org". This is because From/To URI are usually
>> unchanged whithin a dialog.
>
> inaki,
>
> refer would conta
Iñaki Baz Castillo writes:
> - Later alice sends a REFER or a re-INVITE. Note that the request
> would contain "From: sip:2...@domain.org" (even if the AoR of alice us
> "sip:al...@domain.org". This is because From/To URI are usually
> unchanged whithin a dialog.
inaki,
refer would contain heade
2011/4/11 Daniel-Constantin Mierla :
> first, skipping authentication for within dialog requests in default
> configuration file comes mainly from the early years when not many sip
> endpoints supported that. But can be done, of course and perhaps it should
> be enabled (or at least added as a #!de
On Monday 11 April 2011, Eric Hiller wrote:
> I think what I am going to do is use a combination of:
>
> 1. Whitelist my gateway IPs.
>
> 2. Any initial INVITES from non-gateway IPs will be authorized and the
> dialog be added to a simple htable based on callid
>
> 3. Any in-dialog will do a loo
uot;)){ functionality or a way to
iterate through an array of whitelisted ips? (I do not want to configure
database support if possible)
Thanks for the help so far!
-Eric
> Date: Mon, 11 Apr 2011 13:18:10 -0400
> From: abalas...@evaristesys.com
> To: sr-users@lists.sip-router.org
> S
On 04/11/2011 01:10 PM, Henning Westerholt wrote:
Hi Klaus,
sure, there are issues. But we're using the dialog module since now
since some time in our production setup and it works fine for this
particular feature set.
Oh, yeah. I'm a happy and extensive long-time user of the dialog
module
On Monday 11 April 2011, Klaus Darilion wrote:
> Am 11.04.2011 10:17, schrieb Alex Balashov:
> > On 04/11/2011 03:25 AM, Klaus Darilion wrote:
> >> Thus: Check for to-tag. This is how you can differ out-of-dialog
> >> requests from in-dialog requests. Only if the to-tag is present, call
> >> loose_
On 4/11/11 1:06 PM, Stefan Sayer wrote:
o Daniel-Constantin Mierla on 04/11/2011 12:53 PM:
Regarding dialog states, it is not really needed to use dialog module,
I use a lot htable for this purpose -- using call-id and the tags to
build the keys, you can track lot of attributes, as you need, e
o Daniel-Constantin Mierla on 04/11/2011 12:53 PM:
Regarding dialog states, it is not really needed to use dialog module,
I use a lot htable for this purpose -- using call-id and the tags to
build the keys, you can track lot of attributes, as you need, e.g.,
the IP addresses, auth state, a.s.o.
w
Alex Balashov writes:
> > Takeing a look at the previous problems with dialog module, and the
> > recent problems, I prefer to not use dialog module even in the case
> > someone my abuse my proxy as reflector. ;-)
> Out of curiosity, to which problems info you refer? What have I
> missed lately?
Klaus Darilion writes:
> Takeing a look at the previous problems with dialog module, and the
> recent problems, I prefer to not use dialog module even in the case
> someone my abuse my proxy as reflector. ;-)
i agree. dialog modules in sip-router and opensips have always had
lots of problems and
Hello,
On 4/11/11 12:23 PM, Klaus Darilion wrote:
Am 11.04.2011 10:17, schrieb Alex Balashov:
On 04/11/2011 03:25 AM, Klaus Darilion wrote:
Thus: Check for to-tag. This is how you can differ out-of-dialog
requests from in-dialog requests. Only if the to-tag is present, call
loose_route().
I
On Apr 11, 2011, at 6:23 AM, Klaus Darilion
wrote:
>
>>
> Takeing a look at the previous problems with dialog module, and the
> recent problems, I prefer to not use dialog module even in the case
> someone my abuse my proxy as reflector. ;-)
>
Out of curiosity, to which problems info you ref
Am 11.04.2011 10:17, schrieb Alex Balashov:
> On 04/11/2011 03:25 AM, Klaus Darilion wrote:
>
>> Thus: Check for to-tag. This is how you can differ out-of-dialog
>> requests from in-dialog requests. Only if the to-tag is present, call
>> loose_route().
>
> I suppose in principle the problem her
On 04/11/2011 03:25 AM, Klaus Darilion wrote:
Thus: Check for to-tag. This is how you can differ out-of-dialog
requests from in-dialog requests. Only if the to-tag is present, call
loose_route().
I suppose in principle the problem here is that has_totag() only
checks if there is *a* To-tag, n
11 apr 2011 kl. 09.25 skrev Klaus Darilion:
> Hi Eric!
>
> Am 11.04.2011 02:09, schrieb Eric Hiller:
>> As I look and play with loose_route functionality it seems that by
>> simply placing a route: proxyip;lr header in my invite I can bypass any
>> and all security otherwise built into the confi
Hi Eric!
Am 11.04.2011 02:09, schrieb Eric Hiller:
> As I look and play with loose_route functionality it seems that by
> simply placing a route: proxyip;lr header in my invite I can bypass any
> and all security otherwise built into the configuration.
True!
> Is this the way everyone has it?
H
Eric,
On 04/10/2011 08:09 PM, Eric Hiller wrote:
As I look and play with loose_route functionality it seems that by
simply placing a route: proxyip;lr header in my invite I can bypass any
and all security otherwise built into the configuration. Is this the way
everyone has it? I have been unabl
As I look and play with loose_route functionality it seems that by simply
placing a route: proxyip;lr header in my invite I can bypass any and all
security otherwise built into the configuration. Is this the way everyone has
it? I have been unable to find any configuration examples online that
28 matches
Mail list logo