It would be nice if it was possible to configure the module to use preemptive authentication.
I forked the module to add it myself in a primitive way since I needed it only for Basic Authentication, but it would be better to have it configurable.
In functions.h
// Before:
res |= curl_easy_setopt(curl, CURLOPT_HTTPAUTH, (CURLAUTH_DIGEST|CURLAUTH_BASIC));
// After:
res |= curl_easy_setopt(curl, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
From: https://curl.haxx.se/libcurl/c/CURLOPT_HTTPAUTH.html
"If more than one bit is set, libcurl will first query the site to see which authentication methods it supports and then pick the best one you allow it to use. For some methods, this will induce an extra network round-trip" <===== this is what I needed to avoid
---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/515
link_contact_to_impu() does not behave as intended - it will return immediately because ptr==contact .
This will lead to a crash when current contact is always different than the previous.
To prevent this, I set ptr to 0 as it points to a chunk of freed memory anyway.
Removed call to unlink_contact_from_impu() as I believed is redundant and it leads to double free.
This is an usual scenario and it happens with devices that reconnect on TCP , and they change the src port every time , and then the contact will be different.
You can view, comment on, or merge this pull request online at:
https://github.com/kamailio/kamailio/pull/512
-- Commit Summary --
* ims_usrloc_scscf: fix link_contact_to_impu() (was crashing when maxcontact_behaviour == 2)
-- File Changes --
M modules/ims_usrloc_scscf/impurecord.c (4)
-- Patch Links --
https://github.com/kamailio/kamailio/pull/512.patchhttps://github.com/kamailio/kamailio/pull/512.diff
---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/pull/512
The following code is accepted by the cfg parser and will run:
```
$xavp(test1=>stuff) = "america"; # Good
$xavp(test2->stuff) = "bahamas"; # Bad - Hyphen instead of equals
$xavp(test3) = "cuba"; # Bad - No name given
xlog("L_WARN", "1: $xavp(test1)\n");
xlog("L_WARN", "2: $xavp(test2)\n");
xlog("L_WARN", "3: $xavp(test3)\n");
xlog("L_WARN", "4: $xavp(test1=>stuff)\n");
xlog("L_WARN", "5: $xavp(test2=>stuff)\n");
xlog("L_WARN", "6: $xavp(test3=>stuff)\n");
```
This prints:
```
1: <<xavp:0x7ff16f82c898>>
2: <null>
3: cuba
4: america
5: null
<null> or general protection fault/ core was generated......
```
The crash can be fixed by checking the child node type (incoming), but could there be more validation of the (x)avp variables.
I notice that $avp's can be treated as $xavps i.e. the following is accepted.
`$avp(test4=>stuff) = "dominica";`
Is the usage above intended to be acceptable?
---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/511
Hello,
it's been a while since the release of v4.3.4, therefore I am
considering to release a new minor version from branch 4.3 next week,
most probably on Thursday, March 3, 2016. As usual, if there you are
aware of issues not reported to the tracker [1], do it as soon as
possible to get a chance to be fixed before the release date.
Cheers,
Daniel
[1] https://github.com/kamailio/kamailio/issues
--
Daniel-Constantin Mierla
http://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Kamailio Advanced Training, Berlin, March 7-9, 2016 - http://www.asipto.com
Hi,
When client send register message that reg-id in contact is "0", kamailio failed to update contacts info, but it will send 200-register to client, this will cause one issue that no one can find this client(will always be 404 error)
reg-id in message:
Contact: <sip:2015@100080:5060;ob>;reg-id=0
Related logs:
/usr/local/sbin/kamailio[30325]: ERROR: registrar [savec:402]: pack_ci(): invalid reg-id value
/usr/local/sbin/kamailio[30325]: ERROR: registrar [savec:685]: update_contacts(): failed to pack contact specific info
I think registrar should reply 4xx message when reg-id's value is 0
Best Regards,
Shengy
---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/497
A number of additional ports have been opened on Kamailio – the relevant one here is TCP 443. An INVITE comes in from a UA whose from URI is suffixed with :443. PUA generates a PUBLISH out of this. Log is at https://gist.githubusercontent.com/phil-lavin/c381d556c22fd29b4fde/raw/77c5….
The relevant bit to the issue is the last line. PUA is trying to send the PUBLISH to the address and port taken from the from URI… however it sends it over UDP. Because Kamailio is not bound to UDP 443, the PUBLISH is not received.
A hacky “fix” is to make Kamailio bind to UDP 443 as well as TCP 443. I will dig into this deeper today in an attempt to find a better fix.
Suggestions around what is the best solution would be appreciated. I’m thinking that sending this over TCP is not desirable in most instances – unless perhaps Kamailio is only bound to TCP ports?
---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/509
I figured it was worth backporting this crash fix, before the v4.3.5 release Daniel mentioned on the mailing list
- the structure will be destroyed in a later dlg callback, enabled by
dlg_api.register_dlgcb(), via free_dlginfo_cell()
- based and includes partial patch from GH #492, by Phil Lavin
You can view, comment on, or merge this pull request online at:
https://github.com/kamailio/kamailio/pull/518
-- Commit Summary --
* pua_dialoginfo: don't free dlginfo structure in dlg loaded callback
-- File Changes --
M modules/pua_dialoginfo/pua_dialoginfo.c (6)
-- Patch Links --
https://github.com/kamailio/kamailio/pull/518.patchhttps://github.com/kamailio/kamailio/pull/518.diff
---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/pull/518