----- Original Message ----- > From: "CB" <kj...@xnet.co.nz> > To: "Asterisk Users Mailing List - Non-Commercial Discussion" > <asterisk-users@lists.digium.com> > Sent: Tuesday, August 21, 2012 4:39:32 AM > Subject: Re: [asterisk-users] alwaysauthreject=yes not working as expected > > > > Asterisk 1.4.42
First, even if you were right and you discovered a security vulnerability in Asterisk 1.4.42, that version of Asterisk is now in "EOL", and no new security releases will be made. https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions You would of course be more then welcome to solicit patches from the open source community, but no new version of Asterisk 1.4.x would be released. <snip> > Yes I agree they are supposed to be the same but they are not. Below > is the > dialog when a wrong password is provided with alwaysauthreject=yes: > > U 121.98.1.1:1025 -> 203.89.1.1:5060 > REGISTER sip:domain.com SIP/2.0..Via: SIP/2.0/UDP > 192.168.1.103:5060;branch=z9hG4bK-d8754z-d88996fba8b1fd8c-1---d8754z- > ;rport..Max-Forwards: 70..C > ontact: > <sip:12322222261336@192.168.1.103:5060;rinstance=da68419a02006162>. > .To: <sip:12322222261...@domain.com>..From: > <sip:1232222 > 2261...@domain.com>;tag=f910aa53..Call-ID: > ZmM4YTU4NTg2MWNhYzVkYTBhN2Q2MjA1YmUyMmYzY2E...CSeq: 1 > REGISTER..Expires: > 3600..Allow: INVITE, ACK, CANC > EL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, > INFO..User-Agent: > X-Lite release 5.0.0 stamp 67284..Content-Length: 0.... > <snip> > U 203.89.1.1:5060 -> 121.98.1.1:1025 > SIP/2.0 401 Unauthorized..Via: SIP/2.0/UDP > 192.168.1.103:5060;branch=z9hG4bK-d8754z-d88996fba8b1fd8c-1---d8754z- > ;received=121.98.1.1;rport=1025..From: <sip: > 12322222261...@domain.com>;tag=f910aa53..To: > <sip:12322222261...@domain.com>;tag=as16fea110..Call- > ID: ZmM4YTU4NTg2MWNhYzVk > YTBhN2Q2MjA1YmUyMmYzY2E...CSeq: 1 REGISTER..User-Agent: Asterisk > PBX..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, > NOTIFY, > INFO..Supported: repla > ces..WWW-Authenticate: Digest algorithm=MD5, realm="domain.com", > nonce="2f48b121"..Content-Length: 0.... This is expected behavior. > U 121.98.1.1:1025 -> 203.89.1.1:5060 > REGISTER sip:domain.com SIP/2.0..Via: SIP/2.0/UDP > 192.168.1.103:5060;branch=z9hG4bK-d8754z-5c88940128ede618-1---d8754z- > ;rport..Max-Forwards: 70..C > ontact: > <sip:12322222261336@192.168.1.103:5060;rinstance=da68419a02006162>. > .To: <sip:12322222261...@domain.com>..From: > <sip:1232222 > 2261...@domain.com>;tag=f910aa53..Call-ID: > ZmM4YTU4NTg2MWNhYzVkYTBhN2Q2MjA1YmUyMmYzY2E...CSeq: 2 > REGISTER..Expires: > 3600..Allow: INVITE, ACK, CANC > EL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, > INFO..User-Agent: > X-Lite release 5.0.0 stamp 67284..Authorization: Digest > username="12322222261336",re > alm="domain.com",nonce="2f48b121",uri="sip:c-vm- > 02.domain.com",response="cb74a7805412a3ac198800aeede3c06e",algorit > hm=MD5..Content-Length: 0.... > <snip> > SIP/2.0 403 Forbidden (Bad auth)..Via: SIP/2.0/UDP > 192.168.1.103:5060;branch=z9hG4bK-d8754z-5c88940128ede618-1---d8754z- > ;received=121.98.1.1;rport=1025..Fro > m: <sip:12322222261...@domain.com>;tag=f910aa53..To: > <sip:12322222261...@domain.com>;tag=as16fea110..Call-ID: ZmM4YTU4NTg2 > MWNhYzVkYTBhN2Q2MjA1YmUyMmYzY2E...CSeq: 2 REGISTER..User-Agent: > Asterisk PBX..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, > SUBSCRIBE, NOTIFY, INFO..Supporte > d: replaces..Content-Length: 0.... > > Is this a bug or am I missing something obvious? That is expected behavior as well. ;alwaysauthreject = yes ; When an incoming INVITE or REGISTER is to be rejected, ; for any reason, always reject with an identical response ; equivalent to valid username and invalid password/hash ; instead of letting the requester know whether there was ; a matching user or peer for their request. This reduces ; the ability of an attacker to scan for valid SIP usernames. ; This option is set to "yes" by default. The 401 response merely indicates that some level of authorization is required. The 403 response matches what would be sent if the username was valid but an invalid password/hash was provided. This response should be sent regardless if the username was actually valid. Based on your provided SIP traffic, that appears to be what happened. -- Matthew Jordan Digium, Inc. | Engineering Manager 445 Jan Davis Drive NW - Huntsville, AL 35806 - USA Check us out at: http://digium.com & http://asterisk.org -- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users