summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJoshua Colp <jcolp@digium.com>2016-09-07 05:03:24 -0500
committerGerrit Code Review <gerrit2@gerrit.digium.api>2016-09-07 05:03:24 -0500
commite6cad17d6dd4e335632ec27478ccee40bb574cc3 (patch)
tree396d9c7210643d89a73df434c3385b06a465b687
parent2ff853279f406f35b9e90a9319eab96317ae8968 (diff)
parentd80b28560c9403033d3a35e8ec418f1ef0bb57d4 (diff)
Merge "chan_sip: Don't refuse calls with "optional crypto"; fall back to RTP."
-rw-r--r--channels/chan_sip.c29
1 files changed, 24 insertions, 5 deletions
diff --git a/channels/chan_sip.c b/channels/chan_sip.c
index 6250731bd..6a18aa36b 100644
--- a/channels/chan_sip.c
+++ b/channels/chan_sip.c
@@ -1479,7 +1479,8 @@ static int handle_response_register(struct sip_pvt *p, int resp, const char *res
static void handle_response(struct sip_pvt *p, int resp, const char *rest, struct sip_request *req, uint32_t seqno);
/*------ SRTP Support -------- */
-static int process_crypto(struct sip_pvt *p, struct ast_rtp_instance *rtp, struct ast_sdp_srtp **srtp, const char *a);
+static int process_crypto(struct sip_pvt *p, struct ast_rtp_instance *rtp, struct ast_sdp_srtp **srtp,
+ const char *a, int secure_transport);
/*------ T38 Support --------- */
static int transmit_response_with_t38_sdp(struct sip_pvt *p, char *msg, struct sip_request *req, int retrans);
@@ -10609,7 +10610,7 @@ static int process_sdp(struct sip_pvt *p, struct sip_request *req, int t38action
}
} else if (process_sdp_a_sendonly(value, &sendonly)) {
processed = TRUE;
- } else if (!processed_crypto && process_crypto(p, p->rtp, &p->srtp, value)) {
+ } else if (!processed_crypto && process_crypto(p, p->rtp, &p->srtp, value, secure_audio)) {
processed_crypto = TRUE;
processed = TRUE;
} else if (process_sdp_a_audio(value, p, &newaudiortp, &last_rtpmap_codec)) {
@@ -10626,7 +10627,7 @@ static int process_sdp(struct sip_pvt *p, struct sip_request *req, int t38action
if (p->vsrtp) {
ast_set_flag(p->vsrtp, AST_SRTP_CRYPTO_OFFER_OK);
}
- } else if (!processed_crypto && process_crypto(p, p->vrtp, &p->vsrtp, value)) {
+ } else if (!processed_crypto && process_crypto(p, p->vrtp, &p->vsrtp, value, secure_video)) {
processed_crypto = TRUE;
processed = TRUE;
} else if (process_sdp_a_video(value, p, &newvideortp, &last_rtpmap_codec)) {
@@ -10639,7 +10640,7 @@ static int process_sdp(struct sip_pvt *p, struct sip_request *req, int t38action
processed = TRUE;
} else if (process_sdp_a_text(value, p, &newtextrtp, red_fmtp, &red_num_gen, red_data_pt, &last_rtpmap_codec)) {
processed = TRUE;
- } else if (!processed_crypto && process_crypto(p, p->trtp, &p->tsrtp, value)) {
+ } else if (!processed_crypto && process_crypto(p, p->trtp, &p->tsrtp, value, 1)) {
processed_crypto = TRUE;
processed = TRUE;
}
@@ -33750,7 +33751,8 @@ static void sip_send_all_mwi_subscriptions(void)
ao2_iterator_destroy(&iter);
}
-static int process_crypto(struct sip_pvt *p, struct ast_rtp_instance *rtp, struct ast_sdp_srtp **srtp, const char *a)
+static int process_crypto(struct sip_pvt *p, struct ast_rtp_instance *rtp, struct ast_sdp_srtp **srtp,
+ const char *a, int secure_transport)
{
struct ast_rtp_engine_dtls *dtls;
@@ -33766,6 +33768,23 @@ static int process_crypto(struct sip_pvt *p, struct ast_rtp_instance *rtp, struc
/* skip "crypto:" */
a += strlen("crypto:");
+ if (!secure_transport) {
+ /* > The Secure Real-time Transport Protocol (SRTP)
+ * > [RFC3711] provides security services for RTP media
+ * > and is signaled by use of secure RTP transport (e.g.,
+ * > "RTP/SAVP" or "RTP/SAVPF") in an SDP media (m=) line.
+ * > ...
+ * > The "crypto" attribute MUST only appear at the SDP
+ * > media level (not at the session level).
+ *
+ * Ergo, we can trust RTP/(S)AVP to be read from the m=
+ * line before we get here. If it was RTP/AVP, then this
+ * is SNOM-specific optional SRTP. Ignore it.
+ */
+ ast_log(LOG_WARNING, "Ignoring crypto attribute in SDP because RTP transport is insecure\n");
+ return FALSE;
+ }
+
if (!*srtp) {
if (ast_test_flag(&p->flags[0], SIP_OUTGOING)) {
ast_log(LOG_WARNING, "Ignoring unexpected crypto attribute in SDP answer\n");