mirror of
				https://github.com/asterisk/asterisk.git
				synced 2025-10-31 10:47:18 +00:00 
			
		
		
		
	chan_sip: Add security event for calls to invalid extension.
Log a message to security events when an INVITE is received to an invalid extension. ASTERISK-25869 #close Change-Id: I0da40cd7c2206c825c2f0d4e172275df331fcc8f
This commit is contained in:
		
				
					committed by
					
						 Richard Mudgett
						Richard Mudgett
					
				
			
			
				
	
			
			
			
						parent
						
							eb23919e69
						
					
				
				
					commit
					6f8b34f9c1
				
			
							
								
								
									
										5
									
								
								CHANGES
									
									
									
									
									
								
							
							
						
						
									
										5
									
								
								CHANGES
									
									
									
									
									
								
							| @@ -50,6 +50,11 @@ Core | ||||
|    Asterisk is compiled with the LOW_MEMORY compile time option enabled because | ||||
|    the cache code does not exist. | ||||
|  | ||||
| chan_sip | ||||
| ------------------ | ||||
|  * Calls to invalid extensions are now reported as an ACL failure security event | ||||
|    "no_extension_match". | ||||
|  | ||||
| res_rtp_asterisk | ||||
| ------------------ | ||||
|  * The X.509 certificate used for DTLS negotation can now be automatically | ||||
|   | ||||
| @@ -26654,6 +26654,7 @@ static int handle_request_invite(struct sip_pvt *p, struct sip_request *req, str | ||||
| 					ast_log(LOG_NOTICE, "Call from '%s' (%s) to extension" | ||||
| 						" '%s' rejected because extension not found in context '%s'.\n", | ||||
| 						S_OR(p->username, p->peername), ast_sockaddr_stringify(&p->recv), decoded_exten, p->context); | ||||
| 					sip_report_failed_acl(p, "no_extension_match"); | ||||
| 				} | ||||
| 				break; | ||||
| 			case SIP_GET_DEST_REFUSED: | ||||
|   | ||||
		Reference in New Issue
	
	Block a user