Sorry the ser.cfg part that fails when I block cid on my ata is the following:
if (!allow_trusted()) {
if (!radius_proxy_authorize("")) {
proxy_challenge("", "0");
break;
} else if (!check_from()) {
sl_send_reply("403","Setta From=ID");
break;
};
};
So it is not just a matter of credentials.....
please note that the ata has the "sip-Remot-party-ID" enabled.
Any idea on supporting the block of the cid in my design?
Regards
Rosario
----- Original Message -----
From: Rosario Pingaro
To: serusers(a)lists.iptel.org
Sent: Wednesday, October 04, 2006 9:57 AM
Subject: [Serusers] blocking CID continuing using radius authentication
I would like to use the ATAs features to block the CID for anonymous calls.
At the same time I wouldn't like to break my accounting done by Radius
Authentication.
This is the ser.cfg about radius auth for international calls:
if (!radius_is_user_in("From","int")) {
sl_send_reply("403","Internazionali non
abilitate");
break;
I use to authenticate the "From" field so if I disable the CID on the ata I
will receive an anonymous from field.
What do I have to authenticate to mantain a working accounting? Do I have to
authenticate against "Credentials"?
What is the difference between Credentials and from headers?
Regards
Rosario
------------------------------------------------------------------------------
_______________________________________________
Serusers mailing list
Serusers(a)lists.iptel.org
http://lists.iptel.org/mailman/listinfo/serusers