- added INFO() for incomming SIP Calls
This commit is contained in:
parent
5735a8161e
commit
f33e23775a
@ -1,5 +1,9 @@
|
||||
0.3.7
|
||||
=====
|
||||
08-Oct-2003: - rtpproxy_masq: fixed an issue in port allocation
|
||||
which lead to syslog entries from IPCHAINS complaining
|
||||
about 'already used connection'
|
||||
- added INFO() for incomming SIP Calls
|
||||
04-Oct-2003: - Siproxd now also works as outbound proxy 'only',
|
||||
means that local UAs may register themselfes to a
|
||||
3rd party registrar and use siproxd only as oubound
|
||||
|
||||
5
TODO
5
TODO
@ -2,7 +2,6 @@ TODOs, in random order:
|
||||
=======================
|
||||
|
||||
- siproxd daemonized: looks like clashes between threads
|
||||
- Daemonizing: daemon() f*** up a following pthread_create
|
||||
- lost 200 ACK immediately before RTP starts...
|
||||
|
||||
- TERM handler
|
||||
@ -16,8 +15,6 @@ TODOs, in random order:
|
||||
|
||||
- Documentation (yeah, yeah...)
|
||||
|
||||
- support for proxy chaining - "next-hop"
|
||||
|
||||
- general security issues
|
||||
- security tests for received SIP messages (function securitycheck)
|
||||
|
||||
@ -32,4 +29,4 @@ TODOs, in random order:
|
||||
- feature: don't bind to 0.0.0.0 address, but only to inbound/outbound IF's
|
||||
(defined by IFNAME)
|
||||
|
||||
- maybe STUN support
|
||||
- siproxd may use an outbound proxy of its own (chaining feature)
|
||||
|
||||
17
src/proxy.c
17
src/proxy.c
@ -169,8 +169,23 @@ INFO("stopping RTP proxy stream for: %s@%s",
|
||||
#endif
|
||||
/* stop the RTP proxying stream */
|
||||
rtp_stop_fwd(osip_message_get_call_id(request));
|
||||
}
|
||||
|
||||
/* check for incomming request */
|
||||
} else if (MSG_IS_INVITE(request)) {
|
||||
osip_uri_t *contact;
|
||||
contact=((osip_contact_t*)(request->contacts->node->element))->url;
|
||||
if (contact) {
|
||||
INFO("Incomming Call from: %s:%s",
|
||||
contact->username ? contact->username:"*NULL*",
|
||||
contact->host ? contact->host : "*NULL*");
|
||||
} else {
|
||||
INFO("Incomming Call (w/o contact header) from: %s:%s",
|
||||
request->from->url->username ?
|
||||
request->from->url->username:"*NULL*",
|
||||
request->from->url->host ?
|
||||
request->from->url->host : "*NULL*");
|
||||
}
|
||||
}
|
||||
break;
|
||||
|
||||
/*
|
||||
|
||||
@ -289,7 +289,7 @@ INFO("got packet [%i bytes]from %s [%s]", i, inet_ntoa(from.sin_addr), tmp);}
|
||||
if (access & ACCESSCTL_SIP) {
|
||||
sts = proxy_request(my_msg);
|
||||
} else {
|
||||
WARN("non-authorized request received from %s",
|
||||
INFO("non-authorized request received from %s",
|
||||
inet_ntoa(from.sin_addr));
|
||||
}
|
||||
|
||||
@ -301,7 +301,7 @@ INFO("got packet [%i bytes]from %s [%s]", i, inet_ntoa(from.sin_addr), tmp);}
|
||||
if (access & ACCESSCTL_SIP) {
|
||||
sts = proxy_response(my_msg);
|
||||
} else {
|
||||
WARN("non-authorized response received from %s",
|
||||
INFO("non-authorized response received from %s",
|
||||
inet_ntoa(from.sin_addr));
|
||||
}
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user