From: Terry Wilson Date: Tue, 28 Jun 2011 20:03:19 +0000 (+0000) Subject: Don't leak SIP username information X-Git-Tag: 1.4.42~3^2 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=1bca16589d710cf94d94804a6cf5b8dc824615f0;p=thirdparty%2Fasterisk.git Don't leak SIP username information git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/1.4@325275 65c4cc65-6c06-0410-ace0-fbb531ad65f3 --- diff --git a/channels/chan_sip.c b/channels/chan_sip.c index f5413ce796..563f375490 100644 --- a/channels/chan_sip.c +++ b/channels/chan_sip.c @@ -9793,14 +9793,14 @@ static void transmit_fake_auth_response(struct sip_pvt *p, int sipmethod, struct if (ast_test_flag(req, SIP_PKT_IGNORE) && !ast_strlen_zero(p->randdata) && ast_strlen_zero(authtoken)) { /* This is a retransmitted invite/register/etc, don't reconstruct authentication * information */ - transmit_response_with_auth(p, response, req, p->randdata, 0, respheader, 0); + transmit_response_with_auth(p, response, req, p->randdata, reliable, respheader, 0); /* Schedule auto destroy in 32 seconds (according to RFC 3261) */ sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT); return; } else if (ast_strlen_zero(p->randdata) || ast_strlen_zero(authtoken)) { /* We have no auth, so issue challenge and request authentication */ set_nonce_randdata(p, 1); - transmit_response_with_auth(p, response, req, p->randdata, 0, respheader, 0); + transmit_response_with_auth(p, response, req, p->randdata, reliable, respheader, 0); /* Schedule auto destroy in 32 seconds */ sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT); return;