/* * Asterisk -- An open source telephony toolkit. * * Copyright (C) 2013, Digium, Inc. * * Mark Michelson * * See http://www.asterisk.org for more information about * the Asterisk project. Please do not directly contact * any of the maintainers of this project for assistance; * the project provides a web site, mailing lists and IRC * channels for your use. * * This program is free software, distributed under the terms of * the GNU General Public License Version 2. See the LICENSE file * at the top of the source tree. */ /*** MODULEINFO pjproject res_sip core ***/ #include "asterisk.h" #include #include "asterisk/res_sip.h" #include "asterisk/module.h" #include "asterisk/logger.h" #include "asterisk/sorcery.h" #include "asterisk/acl.h" /*** DOCUMENTATION SIP ACL module ACL The ACL module used by res_sip. This module is independent of endpoints and operates on all inbound SIP communication using res_sip. It should be noted that this module can also reference ACLs from acl.conf. There are two main ways of creating an access list: IP-Domain and Contact Header. It is possible to create a combined ACL using both IP and Contact. Access Control List Name of IP ACL This matches sections configured in acl.conf Name of Contact ACL This matches sections configured in acl.conf List of Contact Header addresses to Deny List of Contact Header addresses to Permit List of IP-domains to deny access from List of IP-domains to allow access from Must be of type 'security'. ***/ static int apply_acl(pjsip_rx_data *rdata, struct ast_acl_list *acl) { struct ast_sockaddr addr; if (ast_acl_list_is_empty(acl)) { return 0; } memset(&addr, 0, sizeof(addr)); ast_sockaddr_parse(&addr, rdata->pkt_info.src_name, PARSE_PORT_FORBID); ast_sockaddr_set_port(&addr, rdata->pkt_info.src_port); if (ast_apply_acl(acl, &addr, "SIP ACL: ") != AST_SENSE_ALLOW) { ast_log(LOG_WARNING, "Incoming SIP message from %s did not pass ACL test\n", ast_sockaddr_stringify(&addr)); return 1; } return 0; } static int extract_contact_addr(pjsip_contact_hdr *contact, struct ast_sockaddr **addrs) { pjsip_sip_uri *sip_uri; char host[256]; if (!contact) { return 0; } if (!PJSIP_URI_SCHEME_IS_SIP(contact->uri) && !PJSIP_URI_SCHEME_IS_SIPS(contact->uri)) { return 0; } sip_uri = pjsip_uri_get_uri(contact->uri); ast_copy_pj_str(host, &sip_uri->host, sizeof(host)); return ast_sockaddr_resolve(addrs, host, PARSE_PORT_FORBID, AST_AF_UNSPEC); } static int apply_contact_acl(pjsip_rx_data *rdata, struct ast_acl_list *contact_acl) { int num_contact_addrs; int forbidden = 0; struct ast_sockaddr *contact_addrs; int i; pjsip_contact_hdr *contact = (pjsip_contact_hdr *)&rdata->msg_info.msg->hdr; if (ast_acl_list_is_empty(contact_acl)) { return 0; } while ((contact = pjsip_msg_find_hdr(rdata->msg_info.msg, PJSIP_H_CONTACT, contact->next))) { num_contact_addrs = extract_contact_addr(contact, &contact_addrs); if (num_contact_addrs <= 0) { continue; } for (i = 0; i < num_contact_addrs; ++i) { if (ast_apply_acl(contact_acl, &contact_addrs[i], "SIP Contact ACL: ") != AST_SENSE_ALLOW) { ast_log(LOG_WARNING, "Incoming SIP message from %s did not pass ACL test\n", ast_sockaddr_stringify(&contact_addrs[i])); forbidden = 1; break; } } ast_free(contact_addrs); if (forbidden) { /* No use checking other contacts if we already have failed ACL check */ break; } } return forbidden; } static int check_acls(void *obj, void *arg, int flags) { struct ast_sip_security *security = obj; pjsip_rx_data *rdata = arg; if (apply_acl(rdata, security->acl) || apply_contact_acl(rdata, security->contact_acl)) { return CMP_MATCH | CMP_STOP; } return 0; } static pj_bool_t acl_on_rx_msg(pjsip_rx_data *rdata) { RAII_VAR(struct ao2_container *, acls, ast_sorcery_retrieve_by_fields( ast_sip_get_sorcery(), SIP_SORCERY_SECURITY_TYPE, AST_RETRIEVE_FLAG_MULTIPLE | AST_RETRIEVE_FLAG_ALL, NULL), ao2_cleanup); RAII_VAR(struct ast_sip_security *, matched_acl, NULL, ao2_cleanup); if (!acls) { ast_log(LOG_ERROR, "Unable to retrieve ACL sorcery data\n"); return PJ_FALSE; } if ((matched_acl = ao2_callback(acls, 0, check_acls, rdata))) { if (rdata->msg_info.msg->line.req.method.id != PJSIP_ACK_METHOD) { pjsip_endpt_respond_stateless(ast_sip_get_pjsip_endpoint(), rdata, 403, NULL, NULL, NULL); } return PJ_TRUE; } return PJ_FALSE; } static pjsip_module acl_module = { .name = { "ACL Module", 14 }, /* This should run after a logger but before anything else */ .priority = 1, .on_rx_request = acl_on_rx_msg, }; static int load_module(void) { ast_sip_register_service(&acl_module); return AST_MODULE_LOAD_SUCCESS; } static int unload_module(void) { ast_sip_unregister_service(&acl_module); return 0; } AST_MODULE_INFO(ASTERISK_GPL_KEY, AST_MODFLAG_LOAD_ORDER, "SIP ACL Resource", .load = load_module, .unload = unload_module, .load_pri = AST_MODPRI_APP_DEPEND, );