]> git.ipfire.org Git - thirdparty/asterisk.git/commitdiff
chan_sip: Add security event for calls to invalid extension.
authorCorey Farrell <git@cfware.com>
Thu, 6 Oct 2016 06:29:21 +0000 (02:29 -0400)
committerCorey Farrell <git@cfware.com>
Fri, 15 Dec 2017 15:32:04 +0000 (10:32 -0500)
Log a message to security events when an INVITE is received to an
invalid extension.

ASTERISK-25869 #close

Change-Id: I0da40cd7c2206c825c2f0d4e172275df331fcc8f

CHANGES
channels/chan_sip.c

diff --git a/CHANGES b/CHANGES
index 8a7fb31981bf4cdd872dabd22953181b3476bf8e..7cfdedeac5f83fa92dfed37479c59a54e1dc1442 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -21,6 +21,11 @@ Core
    Asterisk is compiled with the LOW_MEMORY compile time option enabled because
    the cache code does not exist.
 
+chan_sip
+------------------
+ * Calls to invalid extensions are now reported as an ACL failure security event
+   "no_extension_match".
+
 res_rtp_asterisk
 ------------------
  * The X.509 certificate used for DTLS negotation can now be automatically
index 4bae39da03da9b0a9b962d645d53b086197ee00c..b0573002b8a7a17fca242cbc6a874163eae58573 100644 (file)
@@ -26460,6 +26460,7 @@ static int handle_request_invite(struct sip_pvt *p, struct sip_request *req, str
                                        ast_log(LOG_NOTICE, "Call from '%s' (%s) to extension"
                                                " '%s' rejected because extension not found in context '%s'.\n",
                                                S_OR(p->username, p->peername), ast_sockaddr_stringify(&p->recv), decoded_exten, p->context);
+                                       sip_report_failed_acl(p, "no_extension_match");
                                }
                                break;
                        case SIP_GET_DEST_REFUSED: