Hi serusers!
We have an intention to realize some scheme, where the registered client will be able to redirect the received calls to PSTN according to his rights (or belonging to certain group).
We suppose the "TO" field to be reliable in case of forced exchanging of "TO" field content with URI for all incoming calls (but not from local IP address).
The questions are:
1. Is it possible and how we can do it?
if (method=="INVITE") { if (!src_ip==195.234.147.65 && !src_ip==127.0.0.1) { append_hf("P-hint: replace to with url\r\n"); subst('/^To: (.*)$/To: sip:uri/ig'); ??? ~~~ }; };
2. Would it be effective (taking into account the existence of Click-to-dial and other similar applicftions)?
/etc/ser/ser.cfg ----------------
fork=yes
##! Uncomment these lines to enter debugging mode ##!debug=9 # debug level (cmd line: -dddddddddd) ##!fork=no ##!log_stderror=yes
#!check_via=no # (cmd. line: -v) #!dns=no # (cmd. line: -r) #!rev_dns=no # (cmd. line: -R)
children=4
alias=cint.ru listen=195.234.147.65 listen=127.0.0.1 port=5060
user=root group=apache fifo="/tmp/ser_fifo"
# ------------------ module loading ----------------------------------
# Uncomment this if you want to use SQL database loadmodule "/usr/lib/ser/modules/mysql.so" loadmodule "/usr/lib/ser/modules/usrloc.so" loadmodule "/usr/lib/ser/modules/sl.so" loadmodule "/usr/lib/ser/modules/registrar.so" loadmodule "/usr/lib/ser/modules/auth.so" loadmodule "/usr/lib/ser/modules/auth_db.so" loadmodule "/usr/lib/ser/modules/group.so" loadmodule "/usr/lib/ser/modules/rr.so" loadmodule "/usr/lib/ser/modules/tm.so" loadmodule "/usr/lib/ser/modules/acc.so" loadmodule "/usr/lib/ser/modules/nathelper.so" loadmodule "/usr/lib/ser/modules/maxfwd.so" loadmodule "/usr/lib/ser/modules/textops.so" loadmodule "/usr/lib/ser/modules/uri.so"
##!loadmodule "/usr/lib/ser/modules/exec.so" ##!loadmodule "/usr/lib/ser/modules/domain.so" #loadmodule "/usr/lib/ser/modules/cpl-c.so"
# ----------------- setting module-specific parameters
modparam("usrloc", "db_url","") modparam("usrloc", "db_mode", 1)
modparam("auth_db", "db_url","") modparam("auth_db", "calculate_ha1", yes) modparam("auth_db", "password_column", "password")
modparam("group", "db_url","") modparam("group", "use_domain", 1)
modparam("rr", "enable_full_lr", 1)
modparam("acc", "db_url","") modparam("acc", "db_flag", 1) modparam("acc", "db_missed_flag", 2) modparam("acc", "log_flag", 3) modparam("acc", "log_missed_flag", 4) modparam("acc", "failed_transactions", 1)
modparam("registrar", "nat_flag", 6)
modparam("nathelper", "natping_interval", 30) # Ping interval 30 s modparam("nathelper", "ping_nated_only", 1) # Ping only clients behind NAT
# ------------------------- request routing logic
# main routing logic
route{ ##! Uncoment next 1 string for debug setflag(9);
# initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { if (isflagset(9)) log (1, "REPLY: 483 - Too Many Hops"); sl_send_reply("483","Too Many Hops"); break; }; if (msg:len >= max_len ) { if (isflagset(9)) log (1, "REPLY: 513 - Message too big"); sl_send_reply("513", "Message too big"); break; }; # !! Nathelper # Special handling for NATed clients; first, NAT test is # executed: it looks for via!=received and RFC1918 addresses # in Contact (may fail if line-folding is used); also, # the received test should, if completed, should check all # vias for rpesence of received if (nat_uac_test("3")) { # Allow RR-ed requests, as these mayindicate that # a NAT-enabled proxy takes care ofit; unless it is # a REGISTER if (method == "REGISTER" || ! search("^Record-Route:")) { ##!log("LOG: Someone trying to register from private IP, rewriting\n"); # This will work only for user agents that support symmetric # communication. We tested quite many of them and majority is # smart enough to be symmetric. In some phones it takes a configuration # option. With Cisco 7960, it is called NAT_Enable=Yes, with kphone it is # called "symmetric media" and "symmetric signalling".
fix_nated_contact(); # Rewrite contact with source IP of signalling if (method == "INVITE") { fix_nated_sdp("1"); # Add direction=active to SDP }; force_rport(); # Add rport parameter to topmost Via setflag(6); # Mark as NATed }; }; # anti-spam -- if somene claims to belong to our domain in From, # challenge him (skip REGISTERs -- we will chalenge them later) ##! if (search("(From|F):.*@cint.ru")) { if (search("(From|F):.*@cint.ru") || search("(From|F):.*@sip.cint.ru")) { # invites forwarded to other domains, like FWD may cause subsequent # request to come from there but have iptel in From -> verify # only INVITEs (ignore FIFO/UAC's requests, i.e. src_ip==fox) if (method == "INVITE" || method == "SUBSCRIBE") { if (proxy_authorize("cint.ru", "subscriber")) { if (isflagset(9)) log(1, "LOG: PROXY AUTHORIZE - OK\n") } else { if (isflagset(9)) log(1, "LOG: PROXY AUTHORIZE - ERROR, SEND CHALLANGE\n") proxy_challenge("cint.ru", "0"); break; }; # to maintain outside credibility of our proxy, we enforce # username in From to equal digest username; user with # "john.doe" id could advertise "bill.gates" in From otherwise; if (!check_from()) { if (isflagset(9)) log(1, "REPLY: 403 - Insufficient From and digest\n"); sl_send_reply("403", "Insufficient From and digest"); break; }; # we better don't consume credentials -- some requests may be # spiraled through our server (sfo at iptel->7141 at iptel) and the # subsequent iteration may challenge too, for example because of # iptel claim in From; UACs then give up because they # already submitted credentials for the given realm #consume_credentials(); }; # non-REGISTER from other domain } else if ((method == "INVITE" || method == "SUBSCRIBE" || method=="REGISTER" ) && !(uri == myself)) { # and we serve our gateway too (we RR requests to it, so that # its address may show up in subsequent requests after loose_route if (isflagset(9)) log (1, "REPLY: 403 - No relaying"); sl_send_reply("403", "No relaying"); break; };
# we record-route all messages -- to make sure that # subsequent messages will go through our proxy; that's # particularly good if upstream and downstream entities # use different transport protocol if (!method=="REGISTER") record_route();
if (isflagset(9) && method=="INVITE") log(1, "LOG: INVITE\n"); if (isflagset(9) && method=="MESSAGE") log(1, "LOG: MESSAGE\n"); if (isflagset(9) && method=="BYE") log(1, "LOG: BYE\n"); if (isflagset(9) && method=="CANCEL" ) log(1, "LOG: CANCEL\n"); if ( method == "REGISTER" || method=="INVITE" || method=="BYE" || method == "CANCEL" ) { # save messages in mysqlfor CDRTool ##!exec_msg("/usr/local/etc/ser/sertrace.py; exit 1"); setflag(1); setflag(2); /* set for accounting (the same value as in log_flag!) */ if (isflagset(9)) { setflag(3); setflag(4); }; /* Temporay (for debug) */ }; #end of cdrtool
# subsequent messages withing a dialog should take the # path determined by record-routing if (loose_route()) { # mark routing logic in request append_hf("P-hint: rr-enforced\r\n"); route(1); break; };
if (!uri==myself) { # mark routing logic in request append_hf("P-hint: outbound\r\n"); route(1); break; };
if (method=="INVITE") { if (!src_ip==195.234.147.65 && !src_ip==127.0.0.1) { append_hf("P-hint: replace to with url\r\n"); #subst('/^To: (.*)$/To: sip:uri/ig'); #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ }; };
if (uri==myself) { if (method=="REGISTER") { if (www_authorize("cint.ru", "subscriber")) { if (isflagset(9)) if (isflagset(6)) log(1, "LOG: REGISTER WWW (NAT) - OK\n") else log(1, "LOG: REGISTER WWW - OK\n"); } else { if (isflagset(9)) if (isflagset(6)) log(1, "LOG: REGISTER WWW (NAT) - ERROR, SEND CHALLENGE\n") else log(1, "LOG: REGISTER WWW - ERROR, SEND CHALLENGE\n"); www_challenge("cint.ru", "0"); break; }; if (!check_to()) { if (isflagset(9)) log(1, "REPLY: 403 - Insufficient To and digest\n"); sl_send_reply("403", "Insufficient To and digest"); break; }; save("location"); break; }; if (method=="INVITE") { if (src_ip==195.234.147.120) {strip(4);}; }; lookup("aliases"); if (!uri==myself) { append_hf("P-hint: outbound alias\r\n"); route(1); break; }; # native SIP destinations are handled using our USRLOC DB if (!lookup("location")) { #if (uri=~"^sip:8644") {route(9); break;}; #if (uri=~"^sip:5027663") {route(9); break;}; if (uri=~"^sip:8644") {route(4); break;}; if (uri=~"^sip:810") {route(2); break;}; #int if (uri=~"^sip:8[1-9]") {route(3); break;}; #ld if (uri=~"^sip:[0-79]") {route(4); break;}; #local if (isflagset(9)) log (1, "REPLY: 404 - Not Found"); sl_send_reply("404", "Not Found"); break; }; }; append_hf("P-hint: usrloc applied\r\n"); route(1); }
route[1] { if (method=="INVITE" && isflagset(9)) log(1, "ROUTE: VOIP\n"); # !! Nathelper if (uri=~"[@:](192.168.|10.|172.(1[6-9]|2[0-9]|3[0-1]).)" && !search("^Route:")) { if (isflagset(9)) log (1, "REPLY: 479 - We don't forward to private IP addresses"); sl_send_reply("479", "We don't forward to private IP addresses"); break; };
# if client or server know to be behind a NAT, enable relay if (isflagset(6)) { force_rtp_proxy(); };
# NAT processing of replies; apply to allt ransactions (for example, # re-INVITEs from public to private UA are hard to identify as # NATed at the moment of request processing); look at replies t_on_reply("1");
# send it out now; use stateful forwarding as it works reliably # even for UDP2TCP if (!t_relay()) { sl_reply_error(); }; }
# !! Nathelper onreply_route[1] { # NATed transaction ? if (isflagset(6) && status =~ "(183)|2[0-9][0-9]") { fix_nated_contact(); force_rtp_proxy(); # otherwise, is it a transaction behind a NAT and we did not # know at time of request processing ? (RFC1918contacts) } else if (nat_uac_test("1")) { fix_nated_contact(); }; }
route[2] { if (method=="INVITE" && isflagset(9)) log(1, "ROUTE: INT\n"); if (!is_user_in("To", "ld")) { if (!is_user_in("From", "int")) { if (isflagset(9)) log(1, "REPLY: No Permission To Make International Call.\n"); sl_send_reply("403", "No Permission To Make International Call"); break; }; }; route(9); }
route[3] { if (method=="INVITE" && isflagset(9)) log(1, "ROUTE: LD\n"); if (!is_user_in("To", "ld")) { if (!is_user_in("From", "ld")) { if (isflagset(9)) log(1, "REPLY: No Permission To Make Long Distance Call.\n"); sl_send_reply("403", "No Permission To Make Long Distance Call"); break; }; }; route(9); }
route[4] { if (method=="INVITE" && isflagset(9)) log(1, "ROUTE: LOCAL\n"); if (!is_user_in("To", "local")) { if (!is_user_in("From", "local")) { if (isflagset(9)) log(1, "REPLY: No Permission To Make Local Call.\n"); sl_send_reply("403", "No Permission To Make Local Call"); break; }; }; route(9); break; }
route[9] { if (method=="INVITE" && isflagset(9)) log(1, "ROUTE: PSTN\n"); prefix("0550"); rewritehostport("195.234.147.120:5060"); t_relay_to_udp("195.234.147.120","5060"); }