######## Generic Hash Table container in shared memory ########
|
|
modparam("htable", "htable", "auth_cache=>size=16;autoexpire=7200")
|
|
modparam("htable", "htable", "failed_auth_hash=>size=14;autoexpire=180;")
|
|
|
|
####### Authentication Interface module ##########
|
|
loadmodule "auth.so"
|
|
|
|
####### User Location Implementation module ##########
|
|
loadmodule "usrloc.so"
|
|
modparam("usrloc", "db_mode", 0)
|
|
modparam("usrloc", "db_update_as_insert", 1)
|
|
modparam("usrloc", "use_domain", 1)
|
|
modparam("usrloc", "nat_bflag", FLB_NATB)
|
|
|
|
######## NAT Traversal module - signaling functions ########
|
|
#!ifdef NAT-TRAVERSAL-ROLE
|
|
#!trydef NATHELPER-LOADED
|
|
loadmodule "nathelper.so"
|
|
modparam("nathelper", "natping_interval", 30)
|
|
modparam("nathelper", "ping_nated_only", 1)
|
|
modparam("nathelper", "natping_processes", 5)
|
|
modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
|
|
#!endif
|
|
|
|
####### SIP Registrar implementation module ##########
|
|
loadmodule "registrar.so"
|
|
modparam("registrar", "received_avp", "$avp(AVP_RECV_PARAM)")
|
|
modparam("registrar", "min_expires", 300)
|
|
modparam("registrar", "max_expires", 3600)
|
|
|
|
|
|
####### Registrar Logic ########
|
|
route[HANDLE_REGISTER]
|
|
{
|
|
if (is_method("REGISTER")) {
|
|
|
|
#!ifdef TRAFFIC-FILTER-ROLE
|
|
route(DOMAIN_FORMAT_CHECK);
|
|
#!endif
|
|
|
|
#!ifdef NAT-TRAVERSAL-ROLE
|
|
if (nat_uac_test("3")) {
|
|
xlog("L_INFO", "$ci|log|correcting NATed contact in registration");
|
|
force_rport();
|
|
fix_nated_register();
|
|
}
|
|
|
|
## KAZOO-1846: Cisco SPA8000 freaks out on options pings
|
|
if (!($ua =~ "Linksys/SPA8000")) {
|
|
setbflag(FLB_NATB);
|
|
setbflag(FLB_NATSIPPING);
|
|
}
|
|
#!endif
|
|
|
|
if (is_present_hf("Authorization")) {
|
|
#!ifdef TRAFFIC-FILTER-ROLE
|
|
if (!route(PREVENT_BRUTEFORCE)) {
|
|
auth_challenge("$fd", "0");
|
|
exit;
|
|
}
|
|
#!endif
|
|
|
|
if ($sht(auth_cache=>$Au) != $null && pv_auth_check("$fd", "$sht(auth_cache=>$Au)", "0", "0")) {
|
|
xlog("L_INFO", "$ci|log|authenticated $Au via cached SIP creds");
|
|
} else {
|
|
## RABBITMQ - Credentials fetch
|
|
$var(amqp_payload_request) = "{'Event-Category' : 'directory' , 'Event-Name' : 'authn_req', 'Method' : 'REGISTER', 'Auth-Realm' : '" + $fd + "', 'Auth-User' : '" + $fU + "', 'From' : '" + $fu + "', 'To' : '" + $tu +"' }";
|
|
$var(amqp_routing_key) = "authn.req." + $(fd{kz.encode});
|
|
if(kazoo_query("callmgr", $var(amqp_routing_key), $var(amqp_payload_request))) {
|
|
$var(password) = $(kzR{kz.json,Auth-Password});
|
|
if($var(password) != $null) {
|
|
if (!pv_auth_check("$fd", "$var(password)", "0", "0")) {
|
|
|
|
#!ifdef TRAFFIC-FILTER-ROLE
|
|
route(FAILED_AUTH_COUNT);
|
|
#!endif
|
|
|
|
auth_challenge("$fd", "0");
|
|
xlog("L_INFO", "$ci|end|failed registration attempt from $si:$sp for $Au");
|
|
exit;
|
|
} else {
|
|
xlog("L_DBG", "$ci|log|caching SIP credentials for $Au");
|
|
$sht(auth_cache=>$Au) = $var(password);
|
|
}
|
|
} else {
|
|
auth_challenge("$fd", "0");
|
|
xlog("L_INFO", "$ci|log|error getting password from kazoo response");
|
|
exit;
|
|
}
|
|
} else {
|
|
auth_challenge("$fd", "0");
|
|
xlog("L_INFO", "$ci|log|error query kazoo for credentials");
|
|
exit;
|
|
}
|
|
}
|
|
} else {
|
|
auth_challenge("$fd", "0");
|
|
xlog("L_INFO", "$ci|end|issued new auth challenge to registration attempt from $Au $si:$sp");
|
|
exit;
|
|
}
|
|
|
|
# user authenticated - remove auth header
|
|
consume_credentials();
|
|
|
|
save("location");
|
|
$var(expires) = @contact.expires;
|
|
if($var(expires) == $null) {
|
|
$var(expires) = $hdr(Expires);
|
|
}
|
|
if($var(expires) == $null) {
|
|
$var(expires) = 190;
|
|
}
|
|
|
|
$var(params) = "fs_path=<sip:MY_IP_ADDRESS:5060;lr;received='" + $rz + ":" + $si + ":" + $sp + ";transport=" + $proto + "'>";
|
|
|
|
## TODO: fix escaping, some phones send us -- reg-id=1;+sip.instance="urn:uuid:9b8bd513-0e6e-4660-ad5e-5e35d88cc68f";
|
|
## and if we can store it but not use it because it looses the escapes (that weren't there...)
|
|
#if($(ct{tobody.params}) != $null) {
|
|
# $var(params) = $(ct{tobody.params}{s.escape.common}) + ";" + $var(params);
|
|
#}
|
|
|
|
if ($avp(AVP_RECV_PARAM) == $null) {
|
|
$var(fs_contact) = "<" + $(ct{tobody.uri}) + ";" + $var(params) + ">";
|
|
} else {
|
|
$var(fs_contact) = "<sip:" + $(ct{tobody.user}) + "@" + $si + ":" + $sp + ";transport=" + $proto + ";" + $var(params) + ">";
|
|
}
|
|
|
|
xlog("L_INFO", "$ci|end|successful registration with contact $var(fs_contact)");
|
|
$var(register_contants) = ' "Presence-Hosts" : "n/a", "Profile-Name" : "sipinterface_1", "Status" : "Registered", "Event-Timestamp" : "' + $TS + '"';
|
|
|
|
if($var(expires) != $null) {
|
|
$var(register_contants) = $var(register_contants) + ', "Expires" : ' + $var(expires);
|
|
}
|
|
|
|
$var(amqp_payload_request) = '{"Event-Category" : "directory", "Event-Name" : "reg_success", "Contact" : "' + $var(fs_contact) + '", "Call-ID" : "' + $ci + '", "Realm" : "' + $fd + '", "Username" : "' + $fU + '", "From-User" : "' + $fU + '", "From-Host" : "' + $fd + '", "To-User" : "' + $tU + '", "To-Host" : "' + $td + '", "User-Agent" : "' + $ua + '" ,' + $var(register_contants) + ' }';
|
|
|
|
$var(amqp_routing_key) = "registration.success." + $(fd{kz.encode}) + "." + $fU;
|
|
|
|
kazoo_publish("callmgr", $var(amqp_routing_key), $var(amqp_payload_request));
|
|
|
|
exit;
|
|
}
|
|
}
|
|
|
|
# AUTH: check to see if user if present in failed_auth_hash
|
|
route[PREVENT_BRUTEFORCE]
|
|
{
|
|
if (isflagset(FLAG_TRUSTED_SOURCE)) {
|
|
return(1);
|
|
}
|
|
|
|
if($sht(failed_auth_hash=>$Au::count) >= 2) {
|
|
$var(exp) = $Ts - 120;
|
|
if($sht(failed_auth_hash=>$Au::last) > $var(exp)){
|
|
xlog("L_WARN", "$ci|log|possible password brute force, from $ct on user $Au");
|
|
return(-1);
|
|
} else {
|
|
$sht(failed_auth_hash=>$Au::count) = 0;
|
|
}
|
|
}
|
|
return(1);
|
|
}
|
|
|
|
#AUTH: add to failed_auth_hash in case of authentication password error
|
|
route[FAILED_AUTH_COUNT]
|
|
{
|
|
if (isflagset(FLAG_TRUSTED_SOURCE)) {
|
|
return;
|
|
}
|
|
|
|
if ($rc == -2) {
|
|
if($sht(failed_auth_hash=>$Au::count) == $null) {
|
|
$sht(failed_auth_hash=>$Au::count) = 0;
|
|
}
|
|
$sht(failed_auth_hash=>$Au::count) = $sht(failed_auth_hash=>$Au::count) + 1;
|
|
$sht(failed_auth_hash=>$Au::last) = $Ts;
|
|
}
|
|
}
|
|
|
|
route[DOMAIN_FORMAT_CHECK]
|
|
{
|
|
if (isflagset(FLAG_TRUSTED_SOURCE)) {
|
|
return;
|
|
}
|
|
|
|
if ($rd =~ "([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})" ||
|
|
$td =~ "([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})" ) {
|
|
xlog("L_WARN", "$ci|end|denying request with IP domain in From or To header");
|
|
send_reply("403", "Forbidden");
|
|
exit;
|
|
}
|
|
|
|
}
|
|
|
|
# vim: tabstop=4 softtabstop=4 shiftwidth=4 expandtab
|