summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJenkins2 <jenkins2@gerrit.asterisk.org>2017-12-18 08:59:26 -0600
committerGerrit Code Review <gerrit2@gerrit.digium.api>2017-12-18 08:59:26 -0600
commit0fc61f23c606fb9826d007db530217f7961fdb75 (patch)
treed947d5f0101af3dc706c943261210187e45b895a
parentd1a68d90b0c83d2477e2358de91e9dd8fdd6f4e1 (diff)
parente3bd95f55cfc3e4b131c4bd8f9464d7d67bb4cb2 (diff)
Merge "chan_sip: Add security event for calls to invalid extension." into 13
-rw-r--r--CHANGES5
-rw-r--r--channels/chan_sip.c1
2 files changed, 6 insertions, 0 deletions
diff --git a/CHANGES b/CHANGES
index 7dd1aac27..0295e8a31 100644
--- a/CHANGES
+++ b/CHANGES
@@ -21,6 +21,11 @@ Core
Asterisk is compiled with the LOW_MEMORY compile time option enabled because
the cache code does not exist.
+chan_sip
+------------------
+ * Calls to invalid extensions are now reported as an ACL failure security event
+ "no_extension_match".
+
res_pjsip
------------------
* The "identify_by" on endpoints can now be set to "ip" to restrict an endpoint
diff --git a/channels/chan_sip.c b/channels/chan_sip.c
index 9add42564..522e9d1d6 100644
--- a/channels/chan_sip.c
+++ b/channels/chan_sip.c
@@ -26405,6 +26405,7 @@ static int handle_request_invite(struct sip_pvt *p, struct sip_request *req, str
ast_log(LOG_NOTICE, "Call from '%s' (%s) to extension"
" '%s' rejected because extension not found in context '%s'.\n",
S_OR(p->username, p->peername), ast_sockaddr_stringify(&p->recv), decoded_exten, p->context);
+ sip_report_failed_acl(p, "no_extension_match");
}
break;
case SIP_GET_DEST_REFUSED: