Sorry the ser.cfg part that fails when I block cid on my ata is the following: if (!allow_trusted()) { if (!radius_proxy_authorize("")) { proxy_challenge("", "0"); break; } else if (!check_from()) { sl_send_reply("403","Setta From=ID"); break; };
};
So it is not just a matter of credentials..... please note that the ata has the "sip-Remot-party-ID" enabled.
Any idea on supporting the block of the cid in my design?
Regards Rosario ----- Original Message ----- From: Rosario Pingaro To: serusers@lists.iptel.org Sent: Wednesday, October 04, 2006 9:57 AM Subject: [Serusers] blocking CID continuing using radius authentication
I would like to use the ATAs features to block the CID for anonymous calls.
At the same time I wouldn't like to break my accounting done by Radius Authentication.
This is the ser.cfg about radius auth for international calls:
if (!radius_is_user_in("From","int")) { sl_send_reply("403","Internazionali non abilitate"); break;
I use to authenticate the "From" field so if I disable the CID on the ata I will receive an anonymous from field. What do I have to authenticate to mantain a working accounting? Do I have to authenticate against "Credentials"? What is the difference between Credentials and from headers?
Regards
Rosario
------------------------------------------------------------------------------
_______________________________________________ Serusers mailing list Serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers