| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
########################################################################### |
|
2
|
|
|
|
|
|
|
# package Net::SIP::Authorize |
|
3
|
|
|
|
|
|
|
# use in ReceiveChain in front of StatelessProxy, Endpoint.. to authorize request |
|
4
|
|
|
|
|
|
|
# by enforcing authorization and only handling request only if it was |
|
5
|
|
|
|
|
|
|
# fully authorized |
|
6
|
|
|
|
|
|
|
########################################################################### |
|
7
|
|
|
|
|
|
|
|
|
8
|
43
|
|
|
43
|
|
272
|
use strict; |
|
|
43
|
|
|
|
|
80
|
|
|
|
43
|
|
|
|
|
1115
|
|
|
9
|
43
|
|
|
43
|
|
208
|
use warnings; |
|
|
43
|
|
|
|
|
71
|
|
|
|
43
|
|
|
|
|
1371
|
|
|
10
|
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
package Net::SIP::Authorize; |
|
12
|
43
|
|
|
43
|
|
199
|
use Carp 'croak'; |
|
|
43
|
|
|
|
|
73
|
|
|
|
43
|
|
|
|
|
1625
|
|
|
13
|
43
|
|
|
43
|
|
310
|
use Net::SIP::Debug; |
|
|
43
|
|
|
|
|
76
|
|
|
|
43
|
|
|
|
|
221
|
|
|
14
|
43
|
|
|
43
|
|
245
|
use Net::SIP::Util ':all'; |
|
|
43
|
|
|
|
|
72
|
|
|
|
43
|
|
|
|
|
6258
|
|
|
15
|
43
|
|
|
43
|
|
242
|
use Digest::MD5 'md5_hex'; |
|
|
43
|
|
|
|
|
69
|
|
|
|
43
|
|
|
|
|
1948
|
|
|
16
|
43
|
|
|
43
|
|
235
|
use fields qw( realm opaque user2pass user2a1 i_am_proxy dispatcher filter ); |
|
|
43
|
|
|
|
|
82
|
|
|
|
43
|
|
|
|
|
224
|
|
|
17
|
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
########################################################################### |
|
19
|
|
|
|
|
|
|
# creates new Authorize object |
|
20
|
|
|
|
|
|
|
# Args: ($class,%args) |
|
21
|
|
|
|
|
|
|
# %args |
|
22
|
|
|
|
|
|
|
# realm: which realm to announce |
|
23
|
|
|
|
|
|
|
# user2pass: hash of (username => password) or callback which returns |
|
24
|
|
|
|
|
|
|
# password if given username |
|
25
|
|
|
|
|
|
|
# dispatcher: Dispatcher object |
|
26
|
|
|
|
|
|
|
# i_am_proxy: true if should send Proxy-Authenticate, not WWW-Authenticate |
|
27
|
|
|
|
|
|
|
# filter: hashref with extra verification chain, see packages below. |
|
28
|
|
|
|
|
|
|
# Usage: |
|
29
|
|
|
|
|
|
|
# filter => { |
|
30
|
|
|
|
|
|
|
# # filter chain for registration |
|
31
|
|
|
|
|
|
|
# REGISTER => [ |
|
32
|
|
|
|
|
|
|
# # all of this three must succeed (user can regist himself) |
|
33
|
|
|
|
|
|
|
# [ 'ToIsFrom','FromIsRealm','FromIsAuthUser' ], |
|
34
|
|
|
|
|
|
|
# # or this must succeed |
|
35
|
|
|
|
|
|
|
# \&call_back, # callback. If arrayref you MUST set [ \&call_back ] |
|
36
|
|
|
|
|
|
|
# ] |
|
37
|
|
|
|
|
|
|
# # filter chain for invites |
|
38
|
|
|
|
|
|
|
# INVITE => 'FromIsRealm', |
|
39
|
|
|
|
|
|
|
# } |
|
40
|
|
|
|
|
|
|
# Returns: $self |
|
41
|
|
|
|
|
|
|
########################################################################### |
|
42
|
|
|
|
|
|
|
sub new { |
|
43
|
1
|
|
|
1
|
1
|
12
|
my ($class,%args) = @_; |
|
44
|
1
|
|
|
|
|
5
|
my $self = fields::new( $class ); |
|
45
|
1
|
|
50
|
|
|
129
|
$self->{realm} = $args{realm} || 'p5-net-sip'; |
|
46
|
1
|
|
|
|
|
3
|
$self->{opaque} = $args{opaque}; |
|
47
|
|
|
|
|
|
|
|
|
48
|
1
|
0
|
33
|
|
|
2
|
$args{user2pass} || $args{user2a1} || croak 'no user2pass or user2a1 known'; |
|
49
|
|
|
|
|
|
|
|
|
50
|
1
|
|
|
|
|
2
|
$self->{user2pass} = $args{user2pass}; |
|
51
|
1
|
|
|
|
|
2
|
$self->{user2a1} = $args{user2a1}; |
|
52
|
1
|
|
|
|
|
1
|
$self->{i_am_proxy} = $args{i_am_proxy}; |
|
53
|
1
|
|
33
|
|
|
2
|
$self->{dispatcher} = $args{dispatcher} || croak 'no dispatcher'; |
|
54
|
|
|
|
|
|
|
|
|
55
|
1
|
50
|
|
|
|
3
|
if ( my $f = $args{filter}) { |
|
56
|
0
|
0
|
|
|
|
0
|
croak 'filter must be hashref' if ref($f) ne 'HASH'; |
|
57
|
0
|
|
|
|
|
0
|
my %filter; |
|
58
|
0
|
|
|
|
|
0
|
while (my($method,$chain) = each %$f) { |
|
59
|
0
|
0
|
|
|
|
0
|
$chain = [ $chain ] if ref($chain) ne 'ARRAY'; |
|
60
|
0
|
0
|
|
|
|
0
|
map { $_ = [$_] if ref($_) ne 'ARRAY' } @$chain; |
|
|
0
|
|
|
|
|
0
|
|
|
61
|
|
|
|
|
|
|
# now we have: |
|
62
|
|
|
|
|
|
|
# method => [[ cb00,cb01,cb02,..],[ cb10,cb11,cb12,..],...] |
|
63
|
|
|
|
|
|
|
# where either the cb0* chain or the cb1* chain or the cbX* has to succeed |
|
64
|
0
|
|
|
|
|
0
|
for my $or (@$chain) { |
|
65
|
0
|
|
|
|
|
0
|
for (@$or) { |
|
66
|
0
|
0
|
|
|
|
0
|
if (ref($_)) { |
|
67
|
|
|
|
|
|
|
# assume callback |
|
68
|
|
|
|
|
|
|
} else { |
|
69
|
|
|
|
|
|
|
# must have authorize class with verify method |
|
70
|
0
|
|
|
|
|
0
|
my $pkg = __PACKAGE__."::$_"; |
|
71
|
0
|
0
|
0
|
|
|
0
|
my $sub = UNIVERSAL::can($pkg,'verify') || do { |
|
72
|
|
|
|
|
|
|
# load package |
|
73
|
|
|
|
|
|
|
eval "require $pkg"; |
|
74
|
|
|
|
|
|
|
UNIVERSAL::can($pkg,'verify') |
|
75
|
|
|
|
|
|
|
} or die "cannot find sub ${pkg}::verify"; |
|
76
|
0
|
|
|
|
|
0
|
$_ = $sub; |
|
77
|
|
|
|
|
|
|
} |
|
78
|
|
|
|
|
|
|
} |
|
79
|
|
|
|
|
|
|
} |
|
80
|
0
|
|
|
|
|
0
|
$filter{uc($method)} = $chain; |
|
81
|
|
|
|
|
|
|
} |
|
82
|
0
|
|
|
|
|
0
|
$self->{filter} = \%filter; |
|
83
|
|
|
|
|
|
|
} |
|
84
|
1
|
|
|
|
|
7
|
return $self; |
|
85
|
|
|
|
|
|
|
} |
|
86
|
|
|
|
|
|
|
|
|
87
|
|
|
|
|
|
|
########################################################################### |
|
88
|
|
|
|
|
|
|
# handle packet, called from Net::SIP::Dispatcher on incoming requests |
|
89
|
|
|
|
|
|
|
# Args: ($self,$packet,$leg,$addr) |
|
90
|
|
|
|
|
|
|
# $packet: Net::SIP::Request |
|
91
|
|
|
|
|
|
|
# $leg: Net::SIP::Leg where request came in (and response gets send out) |
|
92
|
|
|
|
|
|
|
# $addr: ip:port where request came from and response will be send |
|
93
|
|
|
|
|
|
|
# Returns: TRUE if it handled the packet |
|
94
|
|
|
|
|
|
|
########################################################################### |
|
95
|
|
|
|
|
|
|
sub receive { |
|
96
|
10
|
|
|
10
|
1
|
25
|
my Net::SIP::Authorize $self = shift; |
|
97
|
10
|
|
|
|
|
27
|
my ($packet,$leg,$addr) = @_; |
|
98
|
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
# don't handle responses |
|
100
|
10
|
50
|
|
|
|
30
|
if ( $packet->is_response ) { |
|
101
|
0
|
|
|
|
|
0
|
DEBUG( 100,"pass thru response" ); |
|
102
|
0
|
|
|
|
|
0
|
return; |
|
103
|
|
|
|
|
|
|
} |
|
104
|
10
|
|
|
|
|
28
|
my $method = $packet->method; |
|
105
|
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
# check authorization on request |
|
107
|
|
|
|
|
|
|
my ($rq_key,$rs_key,$acode) = $self->{i_am_proxy} |
|
108
|
10
|
50
|
|
|
|
53
|
? ( 'proxy-authorization', 'proxy-authenticate',407 ) |
|
109
|
|
|
|
|
|
|
: ( 'authorization','www-authenticate',401 ) |
|
110
|
|
|
|
|
|
|
; |
|
111
|
10
|
|
|
|
|
41
|
my @auth = $packet->get_header( $rq_key ); |
|
112
|
10
|
|
|
|
|
19
|
my $user2pass = $self->{user2pass}; |
|
113
|
10
|
|
|
|
|
25
|
my $user2a1 = $self->{user2a1}; |
|
114
|
10
|
|
|
|
|
18
|
my $realm = $self->{realm}; |
|
115
|
10
|
|
|
|
|
24
|
my $opaque = $self->{opaque}; |
|
116
|
|
|
|
|
|
|
|
|
117
|
|
|
|
|
|
|
# there might be multiple auth, pick the right realm |
|
118
|
10
|
|
|
|
|
18
|
my (@keep_auth,$authorized); |
|
119
|
|
|
|
|
|
|
|
|
120
|
10
|
|
|
|
|
33
|
foreach my $auth ( @auth ) { |
|
121
|
|
|
|
|
|
|
# RFC 2617 |
|
122
|
5
|
|
|
|
|
14
|
my ($data,$param) = sip_hdrval2parts( $rq_key => $auth ); |
|
123
|
5
|
50
|
|
|
|
19
|
if ( $param->{realm} ne $realm ) { |
|
124
|
|
|
|
|
|
|
# not for me |
|
125
|
0
|
|
|
|
|
0
|
push @keep_auth,$auth; |
|
126
|
0
|
|
|
|
|
0
|
next; |
|
127
|
|
|
|
|
|
|
} |
|
128
|
5
|
50
|
|
|
|
16
|
if ( defined $opaque ) { |
|
129
|
0
|
0
|
|
|
|
0
|
if ( ! defined $param->{opaque} ) { |
|
|
|
0
|
|
|
|
|
|
|
130
|
0
|
|
|
|
|
0
|
DEBUG( 10,"expected opaque value, but got nothing" ); |
|
131
|
0
|
|
|
|
|
0
|
next; |
|
132
|
|
|
|
|
|
|
} elsif ( $param->{opaque} ne $opaque ) { |
|
133
|
0
|
|
|
|
|
0
|
DEBUG( 10,"got wrong opaque value '$param->{opaque}', expected '$opaque'" ); |
|
134
|
0
|
|
|
|
|
0
|
next; |
|
135
|
|
|
|
|
|
|
} |
|
136
|
|
|
|
|
|
|
} |
|
137
|
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
my ($user,$nonce,$uri,$resp,$qop,$cnonce,$algo ) = |
|
139
|
5
|
|
|
|
|
10
|
@{$param}{ qw/ username nonce uri response qop cnonce algorithm / }; |
|
|
5
|
|
|
|
|
18
|
|
|
140
|
5
|
50
|
33
|
|
|
49
|
if ( lc($data) ne 'digest' |
|
|
|
|
33
|
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
141
|
|
|
|
|
|
|
|| ( $algo && lc($algo) ne 'md5' ) |
|
142
|
|
|
|
|
|
|
|| ( $qop && $qop ne 'auth' ) ) { |
|
143
|
0
|
|
|
|
|
0
|
DEBUG( 10,"unsupported response: $auth" ); |
|
144
|
0
|
|
|
|
|
0
|
next; |
|
145
|
|
|
|
|
|
|
}; |
|
146
|
|
|
|
|
|
|
|
|
147
|
|
|
|
|
|
|
# we support with and w/o qop |
|
148
|
|
|
|
|
|
|
# get a1_hex from either user2a1 or user2pass |
|
149
|
5
|
|
|
|
|
11
|
my $a1_hex; |
|
150
|
5
|
50
|
|
|
|
13
|
if ( ref($user2a1)) { |
|
151
|
0
|
0
|
|
|
|
0
|
if ( ref($user2a1) eq 'HASH' ) { |
|
152
|
0
|
|
|
|
|
0
|
$a1_hex = $user2a1->{$user} |
|
153
|
|
|
|
|
|
|
} else { |
|
154
|
0
|
|
|
|
|
0
|
$a1_hex = invoke_callback( $user2a1,$user,$realm ); |
|
155
|
|
|
|
|
|
|
} |
|
156
|
|
|
|
|
|
|
} |
|
157
|
5
|
50
|
33
|
|
|
37
|
if ( ! defined($a1_hex) && ref($user2pass)) { |
|
158
|
5
|
|
|
|
|
8
|
my $pass; |
|
159
|
5
|
50
|
|
|
|
16
|
if ( ref($user2pass) eq 'HASH' ) { |
|
160
|
5
|
|
|
|
|
23
|
$pass = $user2pass->{$user} |
|
161
|
|
|
|
|
|
|
} else { |
|
162
|
0
|
|
|
|
|
0
|
$pass = invoke_callback( $user2pass,$user ); |
|
163
|
|
|
|
|
|
|
} |
|
164
|
|
|
|
|
|
|
# if wrong credentials ask again for authorization |
|
165
|
5
|
50
|
|
|
|
13
|
last if ! defined $pass; |
|
166
|
5
|
|
|
|
|
31
|
$a1_hex = md5_hex(join( ':',$user,$realm,$pass )); |
|
167
|
|
|
|
|
|
|
} |
|
168
|
|
|
|
|
|
|
|
|
169
|
5
|
50
|
|
|
|
13
|
last if ! defined $a1_hex; # not in user2a1 || user2pass |
|
170
|
|
|
|
|
|
|
|
|
171
|
|
|
|
|
|
|
# ACK just reuse the authorization from INVITE, so they should |
|
172
|
|
|
|
|
|
|
# be checked against method INVITE |
|
173
|
|
|
|
|
|
|
# for CANCEL the RFC doesn't say anything, so we assume it uses |
|
174
|
|
|
|
|
|
|
# CANCEL but try INVITE if this fails |
|
175
|
5
|
50
|
|
|
|
30
|
my @a2 = |
|
|
|
100
|
|
|
|
|
|
|
176
|
|
|
|
|
|
|
$method eq 'ACK' ? ("INVITE:$uri") : |
|
177
|
|
|
|
|
|
|
$method eq 'CANCEL' ? ("CANCEL:$uri","INVITE:$uri") : |
|
178
|
|
|
|
|
|
|
("$method:$uri"); |
|
179
|
|
|
|
|
|
|
|
|
180
|
5
|
|
|
|
|
20
|
while (my $a2 = shift(@a2)) { |
|
181
|
5
|
|
|
|
|
6
|
my $want_response; |
|
182
|
5
|
50
|
|
|
|
12
|
if ( $qop ) { |
|
183
|
|
|
|
|
|
|
# 3.2.2.1 |
|
184
|
0
|
|
|
|
|
0
|
$want_response = md5_hex( join( ':', |
|
185
|
|
|
|
|
|
|
$a1_hex, |
|
186
|
|
|
|
|
|
|
$nonce, |
|
187
|
|
|
|
|
|
|
1, |
|
188
|
|
|
|
|
|
|
$cnonce, |
|
189
|
|
|
|
|
|
|
$qop, |
|
190
|
|
|
|
|
|
|
md5_hex($a2) |
|
191
|
|
|
|
|
|
|
)); |
|
192
|
|
|
|
|
|
|
} else { |
|
193
|
|
|
|
|
|
|
# 3.2.2.1 compability with RFC2069 |
|
194
|
5
|
|
|
|
|
27
|
$want_response = md5_hex( join( ':', |
|
195
|
|
|
|
|
|
|
$a1_hex, |
|
196
|
|
|
|
|
|
|
$nonce, |
|
197
|
|
|
|
|
|
|
md5_hex($a2) |
|
198
|
|
|
|
|
|
|
)); |
|
199
|
|
|
|
|
|
|
} |
|
200
|
|
|
|
|
|
|
|
|
201
|
5
|
50
|
|
|
|
16
|
if ( $resp eq $want_response ) { |
|
202
|
5
|
50
|
33
|
|
|
17
|
if ($self->{filter} and my $or = $self->{filter}{$method}) { |
|
203
|
0
|
|
|
|
|
0
|
for my $and (@$or) { |
|
204
|
0
|
|
|
|
|
0
|
$authorized = 1; |
|
205
|
0
|
|
|
|
|
0
|
for my $cb (@$and) { |
|
206
|
0
|
0
|
|
|
|
0
|
if ( ! invoke_callback( |
|
207
|
|
|
|
|
|
|
$cb,$packet,$leg,$addr,$user,$realm)) { |
|
208
|
0
|
|
|
|
|
0
|
$authorized = 0; |
|
209
|
0
|
|
|
|
|
0
|
last; |
|
210
|
|
|
|
|
|
|
} |
|
211
|
|
|
|
|
|
|
} |
|
212
|
0
|
0
|
|
|
|
0
|
last if $authorized; |
|
213
|
|
|
|
|
|
|
} |
|
214
|
|
|
|
|
|
|
} else { |
|
215
|
5
|
|
|
|
|
8
|
$authorized = 1; |
|
216
|
|
|
|
|
|
|
} |
|
217
|
5
|
|
|
|
|
23
|
last; |
|
218
|
|
|
|
|
|
|
} |
|
219
|
|
|
|
|
|
|
} |
|
220
|
|
|
|
|
|
|
} |
|
221
|
|
|
|
|
|
|
|
|
222
|
|
|
|
|
|
|
# if authorized remove authorization data from this realm |
|
223
|
|
|
|
|
|
|
# and pass packet thru |
|
224
|
10
|
100
|
|
|
|
32
|
if ( $authorized ) { |
|
225
|
5
|
|
|
|
|
36
|
DEBUG( 10, "Request authorized ". $packet->dump ); |
|
226
|
|
|
|
|
|
|
# set header again |
|
227
|
5
|
|
|
|
|
24
|
$packet->set_header( $rq_key => \@keep_auth ); |
|
228
|
5
|
|
|
|
|
26
|
return; |
|
229
|
|
|
|
|
|
|
} |
|
230
|
|
|
|
|
|
|
|
|
231
|
|
|
|
|
|
|
# CANCEL or ACK cannot be prompted for authorization, so |
|
232
|
|
|
|
|
|
|
# they should provide the right data already |
|
233
|
|
|
|
|
|
|
# unauthorized CANCEL or ACK are only valid as response to |
|
234
|
|
|
|
|
|
|
# 401/407 from this Authorize, so they should not be propagated |
|
235
|
5
|
100
|
|
|
|
18
|
if ($method eq 'ACK') { |
|
|
|
50
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
# cancel delivery of response to INVITE |
|
237
|
2
|
|
|
|
|
11
|
$self->{dispatcher}->cancel_delivery( $packet->tid ); |
|
238
|
2
|
|
|
|
|
8
|
return $acode; |
|
239
|
|
|
|
|
|
|
} elsif ($method eq 'CANCEL') { |
|
240
|
0
|
|
|
|
|
0
|
return $acode; |
|
241
|
|
|
|
|
|
|
} |
|
242
|
|
|
|
|
|
|
|
|
243
|
|
|
|
|
|
|
# not authorized yet, ask to authenticate |
|
244
|
|
|
|
|
|
|
# keep it simple RFC2069 style |
|
245
|
3
|
50
|
|
|
|
90
|
my $digest = qq[Digest algorithm=MD5, realm="$realm",]. |
|
246
|
|
|
|
|
|
|
( defined($opaque) ? qq[ opaque="$opaque",] : '' ). |
|
247
|
|
|
|
|
|
|
' nonce="'. md5_hex( $realm.rand(2**32)).'"'; |
|
248
|
|
|
|
|
|
|
|
|
249
|
3
|
|
|
|
|
24
|
my $resp = $packet->create_response( |
|
250
|
|
|
|
|
|
|
$acode, |
|
251
|
|
|
|
|
|
|
'Authorization required', |
|
252
|
|
|
|
|
|
|
{ $rs_key => $digest } |
|
253
|
|
|
|
|
|
|
); |
|
254
|
|
|
|
|
|
|
|
|
255
|
3
|
|
|
|
|
25
|
$self->{dispatcher}->deliver( $resp, leg => $leg, dst_addr => $addr ); |
|
256
|
|
|
|
|
|
|
|
|
257
|
|
|
|
|
|
|
# return $acode (TRUE) to show that packet should |
|
258
|
|
|
|
|
|
|
# not passed thru |
|
259
|
3
|
|
|
|
|
23
|
return $acode; |
|
260
|
|
|
|
|
|
|
} |
|
261
|
|
|
|
|
|
|
|
|
262
|
|
|
|
|
|
|
########################################################################### |
|
263
|
|
|
|
|
|
|
# additional verifications |
|
264
|
|
|
|
|
|
|
# Net::SIP::Authorize::FromIsRealm - checks if the domain in 'From' is |
|
265
|
|
|
|
|
|
|
# the same as the realm in 'Authorization' |
|
266
|
|
|
|
|
|
|
# Net::SIP::Authorize::FromIsAuthUser - checks if the user in 'From' is |
|
267
|
|
|
|
|
|
|
# the same as the username in 'Authorization' |
|
268
|
|
|
|
|
|
|
# Net::SIP::Authorize::ToIsFrom - checks if 'To' and 'From' are equal |
|
269
|
|
|
|
|
|
|
# |
|
270
|
|
|
|
|
|
|
# Args each: ($packet,$leg,$addr,$auth_user,$auth_realm) |
|
271
|
|
|
|
|
|
|
# $packet: Net::SIP::Request |
|
272
|
|
|
|
|
|
|
# $leg: Net::SIP::Leg where request came in (and response gets send out) |
|
273
|
|
|
|
|
|
|
# $addr: ip:port where request came from and response will be send |
|
274
|
|
|
|
|
|
|
# $auth_user: username from 'Authorization' |
|
275
|
|
|
|
|
|
|
# $auth_realm: realm from 'Authorization' |
|
276
|
|
|
|
|
|
|
# Returns: TRUE (1) | FALSE (0) |
|
277
|
|
|
|
|
|
|
########################################################################### |
|
278
|
|
|
|
|
|
|
|
|
279
|
|
|
|
|
|
|
package Net::SIP::Authorize::FromIsRealm; |
|
280
|
43
|
|
|
43
|
|
46234
|
use Net::SIP::Util qw( sip_hdrval2parts sip_uri2parts ); |
|
|
43
|
|
|
|
|
114
|
|
|
|
43
|
|
|
|
|
2232
|
|
|
281
|
43
|
|
|
43
|
|
286
|
use Net::SIP::Debug; |
|
|
43
|
|
|
|
|
157
|
|
|
|
43
|
|
|
|
|
221
|
|
|
282
|
|
|
|
|
|
|
sub verify { |
|
283
|
0
|
|
|
0
|
|
|
my ($packet,$leg,$addr,$auth_user,$auth_realm) = @_; |
|
284
|
0
|
|
|
|
|
|
my $from = $packet->get_header('from'); |
|
285
|
0
|
|
|
|
|
|
($from) = sip_hdrval2parts( from => $from ); |
|
286
|
0
|
|
|
|
|
|
my ($domain) = sip_uri2parts($from); |
|
287
|
0
|
|
|
|
|
|
$domain =~s{:\w+$}{}; |
|
288
|
0
|
0
|
|
|
|
|
return 1 if lc($domain) eq lc($auth_realm); # exact domain |
|
289
|
0
|
0
|
|
|
|
|
return 1 if $domain =~m{\.\Q$auth_realm\E$}i; # subdomain |
|
290
|
0
|
|
|
|
|
|
DEBUG( 10, "No Auth-success: From-domain is '$domain' and realm is '$auth_realm'" ); |
|
291
|
0
|
|
|
|
|
|
return 0; |
|
292
|
|
|
|
|
|
|
} |
|
293
|
|
|
|
|
|
|
|
|
294
|
|
|
|
|
|
|
package Net::SIP::Authorize::FromIsAuthUser; |
|
295
|
43
|
|
|
43
|
|
329
|
use Net::SIP::Util qw( sip_hdrval2parts sip_uri2parts ); |
|
|
43
|
|
|
|
|
139
|
|
|
|
43
|
|
|
|
|
2041
|
|
|
296
|
43
|
|
|
43
|
|
237
|
use Net::SIP::Debug; |
|
|
43
|
|
|
|
|
96
|
|
|
|
43
|
|
|
|
|
161
|
|
|
297
|
|
|
|
|
|
|
sub verify { |
|
298
|
0
|
|
|
0
|
|
|
my ($packet,$leg,$addr,$auth_user,$auth_realm) = @_; |
|
299
|
0
|
|
|
|
|
|
my $from = $packet->get_header('from'); |
|
300
|
0
|
|
|
|
|
|
($from) = sip_hdrval2parts( from => $from ); |
|
301
|
0
|
|
|
|
|
|
my (undef,$user) = sip_uri2parts($from); |
|
302
|
0
|
0
|
|
|
|
|
return 1 if lc($user) eq lc($auth_user); |
|
303
|
0
|
|
|
|
|
|
DEBUG( 10, "No Auth-success: From-user is '$user' and auth_user is '$auth_user'" ); |
|
304
|
0
|
|
|
|
|
|
return 0; |
|
305
|
|
|
|
|
|
|
} |
|
306
|
|
|
|
|
|
|
|
|
307
|
|
|
|
|
|
|
package Net::SIP::Authorize::ToIsFrom; |
|
308
|
43
|
|
|
43
|
|
286
|
use Net::SIP::Util qw( sip_hdrval2parts ); |
|
|
43
|
|
|
|
|
88
|
|
|
|
43
|
|
|
|
|
1823
|
|
|
309
|
43
|
|
|
43
|
|
222
|
use Net::SIP::Debug; |
|
|
43
|
|
|
|
|
111
|
|
|
|
43
|
|
|
|
|
262
|
|
|
310
|
|
|
|
|
|
|
sub verify { |
|
311
|
0
|
|
|
0
|
|
|
my ($packet,$leg,$addr,$auth_user,$auth_realm) = @_; |
|
312
|
0
|
|
|
|
|
|
my $from = $packet->get_header('from'); |
|
313
|
0
|
|
|
|
|
|
($from) = sip_hdrval2parts( from => $from ); |
|
314
|
0
|
|
|
|
|
|
my $to = $packet->get_header('to'); |
|
315
|
0
|
|
|
|
|
|
($to) = sip_hdrval2parts( to => $to ); |
|
316
|
0
|
0
|
|
|
|
|
return 1 if lc($from) eq lc($to); |
|
317
|
0
|
|
|
|
|
|
DEBUG( 10, "No Auth-success: To is '$to' and From is '$from'" ); |
|
318
|
0
|
|
|
|
|
|
return 0; |
|
319
|
|
|
|
|
|
|
} |
|
320
|
|
|
|
|
|
|
|
|
321
|
|
|
|
|
|
|
1; |