Copyright © 2003, 2004 FhG FOKUS
Revision History | |
---|---|
Revision $Revision: 4594 $ | $Date: 2008-08-06 12:08:33 +0200 (Wed, 06 Aug 2008) $ |
Table of Contents
List of Examples
This module implements SIP authentication and authorization with DIAMETER server, namely DIameter Server Client (DISC).
NOTE: diameter support was developed for DISC (DIameter Server Client project at http://developer.berlios.de/projects/disc/). This project seems to be no longer maintained and DIAMETER specifications were updated in the meantime. Thus, the module is obsolete and needs rework to be usable with opendiameter or other DIAMETER servers.
The digest authentication mechanism is presented in next figure.
Example 1.1. Digest Authentication
... a) First phase of Digest Authentication for SIP: +----+ SIP INVITE +=====+ DIAMETER +------+ +------+ | | no Auth hdr #/////# AA-Request | | | | | |---------1--->#/////#-------2------->| |---2-->| | |UAC | #UAS//# |DClnt | |DSrv | | |<-----4-------#(SER)#<------3--------|(DISC)|<--3---|(DISC)| | | 401 #/////# DIAMETER | | | | +----+ Unauthorized +=====+ AA-Answer +------+ +------+ Result-Code=4001 b) Second phase of Digest Authentication for SIP: +----+ SIP INVITE +=====+ DIAMETER +------+ +----+ | | Auth hdr #/////# AA-Request | | | | | |--------1---->#/////#-------2------>| |---2-->| | |UAC | #UAS//# |DClnt | |DSrv| | |<-------4-----#(SER)#<------3-------| |<--3---| | | | 200 OK #/////# DIAMETER | | | | +----+ +=====+ AA-Answer +------+ +----+ Result-Code=2001 ...
The following modules must be loaded before this module:
sl - used to send stateless replies.
Hostname of the machine where the DIAMETER Client is running.
Default value is “localhost”.
Example 1.2. Set diameter_client_host
parameter
... modparam("auth_diameter", "diameter_client_host", "10.10.10.10") ...
SIP Server checks for authorization having a DIAMETER server in backend. If no credentials are provided inside the SIP request then a challenge is sent back to UAC. If the credentials don't match the ones computed by DISC then “403 Forbidden” is sent back.
Negative codes may be interpreted as follows:
-5 (generic error) - some generic error occurred and no reply was sent out;
-3 (stale nonce) - stale nonce;
Meaning of the parameters is as follows:
realm - the realm to be use for authentication and authorization. The string may contain pseudo variables.
This function can be used from REQUEST_ROUTE.
Example 1.5. diameter_www_authorize
usage
... if(!diameter_www_authorize("siphub.net")) { /* user is not authorized */ exit; }; ...
SIP Proxy checks for authorization having a DIAMETER server in backend. If no credentials are provided inside the SIP request then a challenge is sent back to UAC. If the credentials don't match the ones computed by DISC then “403 Forbidden” is sent back. For more about the negative return codes, see the above function.
Meaning of the parameters is as follows:
realm - the realm to be use for authentication and authorization. The string may contain pseudo variables.
This function can be used from REQUEST_ROUTE.
Example 1.6. diameter_proxy_authorize
usage
... if(!diameter_proxy_authorize("siphub.net")) { /* user is not authorized */ exit; }; ...
The method performs group membership checking with DISC.
Meaning of the parameters is as follows:
who - what header to be used to get the SIP URI that is wanted to be checked being member in a certain group. It can be: “Request-URI”, “From”, “To” or “Credentials”.
group - the group name where to check if the user is part of.
This function can be used from REQUEST_ROUTE.
Example 1.7. diameter_is_user_in
usage
... if(!diameter_is_user_in("From", "voicemail")) { /* user is not authorized */ exit; }; ...