| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | /*
 | 
					
						
							|  |  |  |  * Asterisk -- An open source telephony toolkit. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Copyright (C) 2013, Digium, Inc. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Joshua Colp <jcolp@digium.com> | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * See http://www.asterisk.org for more information about
 | 
					
						
							|  |  |  |  * the Asterisk project. Please do not directly contact | 
					
						
							|  |  |  |  * any of the maintainers of this project for assistance; | 
					
						
							|  |  |  |  * the project provides a web site, mailing lists and IRC | 
					
						
							|  |  |  |  * channels for your use. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * This program is free software, distributed under the terms of | 
					
						
							|  |  |  |  * the GNU General Public License Version 2. See the LICENSE file | 
					
						
							|  |  |  |  * at the top of the source tree. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /*!
 | 
					
						
							|  |  |  |  * \file | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * \brief Generate security events in the PJSIP channel | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * \author Joshua Colp <jcolp@digium.com> | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include "asterisk.h"
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include <pjsip.h>
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2013-07-30 18:14:50 +00:00
										 |  |  | #include "asterisk/res_pjsip.h"
 | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | #include "asterisk/security_events.h"
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static enum ast_transport security_event_get_transport(pjsip_rx_data *rdata) | 
					
						
							|  |  |  | { | 
					
						
							| 
									
										
										
										
											2013-12-01 19:58:08 +00:00
										 |  |  | 	if (rdata->tp_info.transport->key.type == PJSIP_TRANSPORT_UDP || | 
					
						
							|  |  |  | 		rdata->tp_info.transport->key.type == PJSIP_TRANSPORT_UDP6) { | 
					
						
							|  |  |  | 		return AST_TRANSPORT_UDP; | 
					
						
							|  |  |  | 	} else if (rdata->tp_info.transport->key.type == PJSIP_TRANSPORT_TCP || | 
					
						
							|  |  |  | 		rdata->tp_info.transport->key.type == PJSIP_TRANSPORT_TCP6) { | 
					
						
							|  |  |  | 		return AST_TRANSPORT_TCP; | 
					
						
							|  |  |  | 	} else if (rdata->tp_info.transport->key.type == PJSIP_TRANSPORT_TLS || | 
					
						
							|  |  |  | 		rdata->tp_info.transport->key.type == PJSIP_TRANSPORT_TLS6) { | 
					
						
							|  |  |  | 		return AST_TRANSPORT_TLS; | 
					
						
							| 
									
										
										
										
											2017-02-16 10:22:47 +00:00
										 |  |  | 	} else if (!strcasecmp(rdata->tp_info.transport->type_name, "WS")) { | 
					
						
							| 
									
										
										
										
											2013-12-01 19:58:08 +00:00
										 |  |  | 		return AST_TRANSPORT_WS; | 
					
						
							| 
									
										
										
										
											2017-02-16 10:22:47 +00:00
										 |  |  | 	} else if (!strcasecmp(rdata->tp_info.transport->type_name, "WSS")) { | 
					
						
							| 
									
										
										
										
											2013-12-01 19:58:08 +00:00
										 |  |  | 		return AST_TRANSPORT_WSS; | 
					
						
							|  |  |  | 	} else { | 
					
						
							|  |  |  | 		return 0; | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static void security_event_populate(pjsip_rx_data *rdata, char *call_id, size_t call_id_size, struct ast_sockaddr *local, struct ast_sockaddr *remote) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	char host[NI_MAXHOST]; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_copy_pj_str(call_id, &rdata->msg_info.cid->id, call_id_size); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_copy_pj_str(host, &rdata->tp_info.transport->local_name.host, sizeof(host)); | 
					
						
							|  |  |  | 	ast_sockaddr_parse(local, host, PARSE_PORT_FORBID); | 
					
						
							|  |  |  | 	ast_sockaddr_set_port(local, rdata->tp_info.transport->local_name.port); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_sockaddr_parse(remote, rdata->pkt_info.src_name, PARSE_PORT_FORBID); | 
					
						
							|  |  |  | 	ast_sockaddr_set_port(remote, rdata->pkt_info.src_port); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2014-01-10 20:00:16 +00:00
										 |  |  | static const char *get_account_id(struct ast_sip_endpoint *endpoint) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	RAII_VAR(struct ast_sip_endpoint *, artificial, ast_sip_get_artificial_endpoint(), ao2_cleanup); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return endpoint == artificial ? "<unknown>" : ast_sorcery_object_get_id(endpoint); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | void ast_sip_report_invalid_endpoint(const char *name, pjsip_rx_data *rdata) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	enum ast_transport transport = security_event_get_transport(rdata); | 
					
						
							|  |  |  | 	char call_id[pj_strlen(&rdata->msg_info.cid->id) + 1]; | 
					
						
							|  |  |  | 	struct ast_sockaddr local, remote; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	struct ast_security_event_inval_acct_id inval_acct_id = { | 
					
						
							|  |  |  | 		.common.event_type = AST_SECURITY_EVENT_INVAL_ACCT_ID, | 
					
						
							|  |  |  | 		.common.version    = AST_SECURITY_EVENT_INVAL_ACCT_ID_VERSION, | 
					
						
							|  |  |  | 		.common.service    = "PJSIP", | 
					
						
							|  |  |  | 		.common.account_id = name, | 
					
						
							|  |  |  | 		.common.local_addr = { | 
					
						
							|  |  |  | 			.addr      = &local, | 
					
						
							|  |  |  | 			.transport = transport, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		.common.remote_addr = { | 
					
						
							|  |  |  | 			.addr       = &remote, | 
					
						
							|  |  |  | 			.transport = transport, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		.common.session_id = call_id, | 
					
						
							|  |  |  | 	}; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	security_event_populate(rdata, call_id, sizeof(call_id), &local, &remote); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_security_event_report(AST_SEC_EVT(&inval_acct_id)); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void ast_sip_report_failed_acl(struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata, const char *name) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	enum ast_transport transport = security_event_get_transport(rdata); | 
					
						
							|  |  |  | 	char call_id[pj_strlen(&rdata->msg_info.cid->id) + 1]; | 
					
						
							|  |  |  | 	struct ast_sockaddr local, remote; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	struct ast_security_event_failed_acl failed_acl_event = { | 
					
						
							|  |  |  | 			.common.event_type  = AST_SECURITY_EVENT_FAILED_ACL, | 
					
						
							|  |  |  | 			.common.version     = AST_SECURITY_EVENT_FAILED_ACL_VERSION, | 
					
						
							|  |  |  | 			.common.service     = "PJSIP", | 
					
						
							| 
									
										
										
										
											2014-01-10 20:00:16 +00:00
										 |  |  | 			.common.account_id  = get_account_id(endpoint), | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | 			.common.local_addr  = { | 
					
						
							|  |  |  | 					.addr       = &local, | 
					
						
							|  |  |  | 					.transport  = transport, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			.common.remote_addr = { | 
					
						
							|  |  |  | 					.addr       = &remote, | 
					
						
							|  |  |  | 					.transport  = transport, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			.common.session_id  = call_id, | 
					
						
							|  |  |  | 			.acl_name           = name, | 
					
						
							|  |  |  | 	}; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	security_event_populate(rdata, call_id, sizeof(call_id), &local, &remote); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_security_event_report(AST_SEC_EVT(&failed_acl_event)); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void ast_sip_report_auth_failed_challenge_response(struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	pjsip_authorization_hdr *auth = pjsip_msg_find_hdr(rdata->msg_info.msg, PJSIP_H_AUTHORIZATION, NULL); | 
					
						
							|  |  |  | 	enum ast_transport transport = security_event_get_transport(rdata); | 
					
						
							|  |  |  | 	char call_id[pj_strlen(&rdata->msg_info.cid->id) + 1]; | 
					
						
							|  |  |  | 	char nonce[64] = "", response[256] = ""; | 
					
						
							|  |  |  | 	struct ast_sockaddr local, remote; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	struct ast_security_event_chal_resp_failed chal_resp_failed = { | 
					
						
							|  |  |  | 				.common.event_type = AST_SECURITY_EVENT_CHAL_RESP_FAILED, | 
					
						
							|  |  |  | 				.common.version    = AST_SECURITY_EVENT_CHAL_RESP_FAILED_VERSION, | 
					
						
							|  |  |  | 				.common.service    = "PJSIP", | 
					
						
							| 
									
										
										
										
											2014-01-10 20:00:16 +00:00
										 |  |  | 				.common.account_id = get_account_id(endpoint), | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | 				.common.local_addr = { | 
					
						
							|  |  |  | 						.addr      = &local, | 
					
						
							|  |  |  | 						.transport = transport, | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 				.common.remote_addr = { | 
					
						
							|  |  |  | 						.addr      = &remote, | 
					
						
							|  |  |  | 						.transport = transport, | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 				.common.session_id = call_id, | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				.challenge         = nonce, | 
					
						
							|  |  |  | 				.response          = response, | 
					
						
							|  |  |  | 				.expected_response = "", | 
					
						
							| 
									
										
										
										
											2014-01-10 20:00:16 +00:00
										 |  |  | 	}; | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2014-01-08 17:23:03 +00:00
										 |  |  | 	if (auth && !pj_strcmp2(&auth->scheme, "Digest")) { | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | 		ast_copy_pj_str(nonce, &auth->credential.digest.nonce, sizeof(nonce)); | 
					
						
							|  |  |  | 		ast_copy_pj_str(response, &auth->credential.digest.response, sizeof(response)); | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	security_event_populate(rdata, call_id, sizeof(call_id), &local, &remote); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_security_event_report(AST_SEC_EVT(&chal_resp_failed)); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void ast_sip_report_auth_success(struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	pjsip_authorization_hdr *auth = pjsip_msg_find_hdr(rdata->msg_info.msg, PJSIP_H_AUTHORIZATION, NULL); | 
					
						
							|  |  |  | 	enum ast_transport transport = security_event_get_transport(rdata); | 
					
						
							|  |  |  | 	char call_id[pj_strlen(&rdata->msg_info.cid->id) + 1]; | 
					
						
							|  |  |  | 	struct ast_sockaddr local, remote; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	struct ast_security_event_successful_auth successful_auth = { | 
					
						
							|  |  |  | 			.common.event_type  = AST_SECURITY_EVENT_SUCCESSFUL_AUTH, | 
					
						
							|  |  |  | 			.common.version     = AST_SECURITY_EVENT_SUCCESSFUL_AUTH_VERSION, | 
					
						
							|  |  |  | 			.common.service     = "PJSIP", | 
					
						
							| 
									
										
										
										
											2014-01-10 20:00:16 +00:00
										 |  |  | 			.common.account_id  = get_account_id(endpoint), | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | 			.common.local_addr  = { | 
					
						
							|  |  |  | 					.addr       = &local, | 
					
						
							|  |  |  | 					.transport  = transport, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			.common.remote_addr = { | 
					
						
							|  |  |  | 					.addr       = &remote, | 
					
						
							|  |  |  | 					.transport  = transport, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			.common.session_id  = call_id, | 
					
						
							|  |  |  | 			.using_password     = auth ? (uint32_t *)1 : (uint32_t *)0, | 
					
						
							|  |  |  | 	}; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	security_event_populate(rdata, call_id, sizeof(call_id), &local, &remote); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_security_event_report(AST_SEC_EVT(&successful_auth)); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void ast_sip_report_auth_challenge_sent(struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata, pjsip_tx_data *tdata) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	pjsip_www_authenticate_hdr *auth = pjsip_msg_find_hdr(tdata->msg, PJSIP_H_WWW_AUTHENTICATE, NULL); | 
					
						
							|  |  |  | 	enum ast_transport transport = security_event_get_transport(rdata); | 
					
						
							|  |  |  | 	char nonce[64] = "", call_id[pj_strlen(&rdata->msg_info.cid->id) + 1]; | 
					
						
							|  |  |  | 	struct ast_sockaddr local, remote; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	struct ast_security_event_chal_sent chal_sent = { | 
					
						
							|  |  |  | 			.common.event_type = AST_SECURITY_EVENT_CHAL_SENT, | 
					
						
							|  |  |  | 			.common.version    = AST_SECURITY_EVENT_CHAL_SENT_VERSION, | 
					
						
							|  |  |  | 			.common.service    = "PJSIP", | 
					
						
							| 
									
										
										
										
											2014-01-10 20:00:16 +00:00
										 |  |  | 			.common.account_id = get_account_id(endpoint), | 
					
						
							| 
									
										
										
										
											2013-06-22 14:03:22 +00:00
										 |  |  | 			.common.local_addr = { | 
					
						
							|  |  |  | 					.addr      = &local, | 
					
						
							|  |  |  | 					.transport = transport, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			.common.remote_addr = { | 
					
						
							|  |  |  | 					.addr      = &remote, | 
					
						
							|  |  |  | 					.transport = transport, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			.common.session_id = call_id, | 
					
						
							|  |  |  | 			.challenge         = nonce, | 
					
						
							|  |  |  | 	}; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if (auth && !pj_strcmp2(&auth->scheme, "digest")) { | 
					
						
							|  |  |  | 		ast_copy_pj_str(nonce, &auth->challenge.digest.nonce, sizeof(nonce)); | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	security_event_populate(rdata, call_id, sizeof(call_id), &local, &remote); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_security_event_report(AST_SEC_EVT(&chal_sent)); | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2013-09-26 18:51:54 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | void ast_sip_report_req_no_support(struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata, | 
					
						
							|  |  |  | 				   const char* req_type) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	enum ast_transport transport = security_event_get_transport(rdata); | 
					
						
							|  |  |  | 	char call_id[pj_strlen(&rdata->msg_info.cid->id) + 1]; | 
					
						
							|  |  |  | 	struct ast_sockaddr local, remote; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	struct ast_security_event_req_no_support req_no_support_event = { | 
					
						
							|  |  |  | 		.common.event_type  = AST_SECURITY_EVENT_REQ_NO_SUPPORT, | 
					
						
							|  |  |  | 		.common.version     = AST_SECURITY_EVENT_REQ_NO_SUPPORT_VERSION, | 
					
						
							|  |  |  | 		.common.service     = "PJSIP", | 
					
						
							| 
									
										
										
										
											2014-01-10 20:00:16 +00:00
										 |  |  | 		.common.account_id  = get_account_id(endpoint), | 
					
						
							| 
									
										
										
										
											2013-09-26 18:51:54 +00:00
										 |  |  | 		.common.local_addr  = { | 
					
						
							|  |  |  | 			.addr       = &local, | 
					
						
							|  |  |  | 			.transport  = transport, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		.common.remote_addr = { | 
					
						
							|  |  |  | 			.addr       = &remote, | 
					
						
							|  |  |  | 			.transport  = transport, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		.common.session_id  = call_id, | 
					
						
							|  |  |  | 		.request_type       = req_type | 
					
						
							|  |  |  | 	}; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	security_event_populate(rdata, call_id, sizeof(call_id), &local, &remote); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_security_event_report(AST_SEC_EVT(&req_no_support_event)); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void ast_sip_report_mem_limit(struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  | 	enum ast_transport transport = security_event_get_transport(rdata); | 
					
						
							|  |  |  | 	char call_id[pj_strlen(&rdata->msg_info.cid->id) + 1]; | 
					
						
							|  |  |  | 	struct ast_sockaddr local, remote; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	struct ast_security_event_mem_limit mem_limit_event = { | 
					
						
							|  |  |  | 		.common.event_type  = AST_SECURITY_EVENT_MEM_LIMIT, | 
					
						
							|  |  |  | 		.common.version     = AST_SECURITY_EVENT_MEM_LIMIT_VERSION, | 
					
						
							|  |  |  | 		.common.service     = "PJSIP", | 
					
						
							| 
									
										
										
										
											2014-01-10 20:00:16 +00:00
										 |  |  | 		.common.account_id  = get_account_id(endpoint), | 
					
						
							| 
									
										
										
										
											2013-09-26 18:51:54 +00:00
										 |  |  | 		.common.local_addr  = { | 
					
						
							|  |  |  | 			.addr       = &local, | 
					
						
							|  |  |  | 			.transport  = transport, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		.common.remote_addr = { | 
					
						
							|  |  |  | 			.addr       = &remote, | 
					
						
							|  |  |  | 			.transport  = transport, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		.common.session_id  = call_id | 
					
						
							|  |  |  | 	}; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	security_event_populate(rdata, call_id, sizeof(call_id), &local, &remote); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ast_security_event_report(AST_SEC_EVT(&mem_limit_event)); | 
					
						
							|  |  |  | } |