- added INFO() for incomming SIP Calls

This commit is contained in:
Thomas Ries 2003-10-08 20:34:24 +00:00
parent 5735a8161e
commit f33e23775a
4 changed files with 23 additions and 7 deletions

View File

@ -1,5 +1,9 @@
0.3.7
=====
08-Oct-2003: - rtpproxy_masq: fixed an issue in port allocation
which lead to syslog entries from IPCHAINS complaining
about 'already used connection'
- added INFO() for incomming SIP Calls
04-Oct-2003: - Siproxd now also works as outbound proxy 'only',
means that local UAs may register themselfes to a
3rd party registrar and use siproxd only as oubound

5
TODO
View File

@ -2,7 +2,6 @@ TODOs, in random order:
=======================
- siproxd daemonized: looks like clashes between threads
- Daemonizing: daemon() f*** up a following pthread_create
- lost 200 ACK immediately before RTP starts...
- TERM handler
@ -16,8 +15,6 @@ TODOs, in random order:
- Documentation (yeah, yeah...)
- support for proxy chaining - "next-hop"
- general security issues
- security tests for received SIP messages (function securitycheck)
@ -32,4 +29,4 @@ TODOs, in random order:
- feature: don't bind to 0.0.0.0 address, but only to inbound/outbound IF's
(defined by IFNAME)
- maybe STUN support
- siproxd may use an outbound proxy of its own (chaining feature)

View File

@ -169,8 +169,23 @@ INFO("stopping RTP proxy stream for: %s@%s",
#endif
/* stop the RTP proxying stream */
rtp_stop_fwd(osip_message_get_call_id(request));
}
/* check for incomming request */
} else if (MSG_IS_INVITE(request)) {
osip_uri_t *contact;
contact=((osip_contact_t*)(request->contacts->node->element))->url;
if (contact) {
INFO("Incomming Call from: %s:%s",
contact->username ? contact->username:"*NULL*",
contact->host ? contact->host : "*NULL*");
} else {
INFO("Incomming Call (w/o contact header) from: %s:%s",
request->from->url->username ?
request->from->url->username:"*NULL*",
request->from->url->host ?
request->from->url->host : "*NULL*");
}
}
break;
/*

View File

@ -289,7 +289,7 @@ INFO("got packet [%i bytes]from %s [%s]", i, inet_ntoa(from.sin_addr), tmp);}
if (access & ACCESSCTL_SIP) {
sts = proxy_request(my_msg);
} else {
WARN("non-authorized request received from %s",
INFO("non-authorized request received from %s",
inet_ntoa(from.sin_addr));
}
@ -301,7 +301,7 @@ INFO("got packet [%i bytes]from %s [%s]", i, inet_ntoa(from.sin_addr), tmp);}
if (access & ACCESSCTL_SIP) {
sts = proxy_response(my_msg);
} else {
WARN("non-authorized response received from %s",
INFO("non-authorized response received from %s",
inet_ntoa(from.sin_addr));
}