mirror of https://github.com/asterisk/asterisk
parent
eb782ec341
commit
a0db68c190
@ -1 +1 @@
|
||||
ChangeLogs/ChangeLog-22.2.0-rc2.md
|
||||
ChangeLogs/ChangeLog-22.2.0.md
|
@ -1,123 +0,0 @@
|
||||
|
||||
## Change Log for Release asterisk-22.2.0-rc2
|
||||
|
||||
### Links:
|
||||
|
||||
- [Full ChangeLog](https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-22.2.0-rc2.md)
|
||||
- [GitHub Diff](https://github.com/asterisk/asterisk/compare/22.2.0-rc1...22.2.0-rc2)
|
||||
- [Tarball](https://downloads.asterisk.org/pub/telephony/asterisk/asterisk-22.2.0-rc2.tar.gz)
|
||||
- [Downloads](https://downloads.asterisk.org/pub/telephony/asterisk)
|
||||
|
||||
### Summary:
|
||||
|
||||
- Commits: 3
|
||||
- Commit Authors: 1
|
||||
- Issues Resolved: 2
|
||||
- Security Advisories Resolved: 0
|
||||
|
||||
### User Notes:
|
||||
|
||||
|
||||
### Upgrade Notes:
|
||||
|
||||
- #### alembic: Database updates required.
|
||||
Two commits in this release...
|
||||
'Add SHA-256 and SHA-512-256 as authentication digest algorithms'
|
||||
'res_pjsip: Add new AOR option "qualify_2xx_only"'
|
||||
...have modified alembic scripts for the following database tables: ps_aors,
|
||||
ps_contacts, ps_auths, ps_globals. If you don't use the scripts to update
|
||||
your database, reads from those tables will succeeed but inserts into the
|
||||
ps_contacts table by res_pjsip_registrar will fail.
|
||||
|
||||
|
||||
### Commit Authors:
|
||||
|
||||
- George Joseph: (3)
|
||||
|
||||
## Issue and Commit Detail:
|
||||
|
||||
### Closed Issues:
|
||||
|
||||
- 1095: [bug]: res_pjsip missing "Failed to authenticate" log entry for unknown endpoint
|
||||
- 1097: [bug]: res_pjsip/pjsip_options. ODBC: Unknown column 'qualify_2xx_only'
|
||||
|
||||
### Commits By Author:
|
||||
|
||||
- #### George Joseph (3):
|
||||
- res_pjsip: Fix startup/reload memory leak in config_auth.
|
||||
- alembic: Database updates required.
|
||||
- res_pjsip_authenticator_digest: Make correct error messages appear again.
|
||||
|
||||
|
||||
### Commit List:
|
||||
|
||||
- res_pjsip_authenticator_digest: Make correct error messages appear again.
|
||||
- alembic: Database updates required.
|
||||
- res_pjsip: Fix startup/reload memory leak in config_auth.
|
||||
|
||||
### Commit Details:
|
||||
|
||||
#### res_pjsip_authenticator_digest: Make correct error messages appear again.
|
||||
Author: George Joseph
|
||||
Date: 2025-01-28
|
||||
|
||||
When an incoming request can't be matched to an endpoint, the "artificial"
|
||||
auth object is used to create a challenge to return in a 401 response and we
|
||||
emit a "No matching endpoint found" log message. If the client then responds
|
||||
with an Authorization header but the request still can't be matched to an
|
||||
endpoint, the verification will fail and, as before, we'll create a challenge
|
||||
to return in a 401 response and we emit a "No matching endpoint found" log
|
||||
message. HOWEVER, because there WAS an Authorization header and it failed
|
||||
verification, we should have also been emitting a "Failed to authenticate"
|
||||
log message but weren't because there was a check that short-circuited that
|
||||
it if the artificial auth was used. Since many admins use the "Failed to
|
||||
authenticate" message with log parsers like fail2ban, those attempts were not
|
||||
being recognized as suspicious.
|
||||
|
||||
Changes:
|
||||
|
||||
* digest_check_auth() now always emits the "Failed to authenticate" log
|
||||
message if verification of an Authorization header failed even if the
|
||||
artificial auth was used.
|
||||
|
||||
* The verification logic was refactored to be clearer about the handling
|
||||
of the return codes from verify().
|
||||
|
||||
* Comments were added clarify what return codes digest_check_auth() should
|
||||
return to the distributor and the implications of changing them.
|
||||
|
||||
Resolves: #1095
|
||||
|
||||
#### alembic: Database updates required.
|
||||
Author: George Joseph
|
||||
Date: 2025-01-28
|
||||
|
||||
This commit doesn't actually change anything. It just adds the following
|
||||
upgrade notes that were omitted from the original commits.
|
||||
|
||||
Resolves: #1097
|
||||
|
||||
UpgradeNote: Two commits in this release...
|
||||
'Add SHA-256 and SHA-512-256 as authentication digest algorithms'
|
||||
'res_pjsip: Add new AOR option "qualify_2xx_only"'
|
||||
...have modified alembic scripts for the following database tables: ps_aors,
|
||||
ps_contacts, ps_auths, ps_globals. If you don't use the scripts to update
|
||||
your database, reads from those tables will succeeed but inserts into the
|
||||
ps_contacts table by res_pjsip_registrar will fail.
|
||||
|
||||
#### res_pjsip: Fix startup/reload memory leak in config_auth.
|
||||
Author: George Joseph
|
||||
Date: 2025-01-23
|
||||
|
||||
An issue in config_auth.c:ast_sip_auth_digest_algorithms_vector_init() was
|
||||
causing double allocations for the two supported_algorithms vectors to the
|
||||
tune of 915 bytes. The leak only happens on startup and when a reload is done
|
||||
and doesn't get bigger with the number of auth objects defined.
|
||||
|
||||
* Pre-initialized the two vectors in config_auth:auth_alloc().
|
||||
* Removed the allocations in ast_sip_auth_digest_algorithms_vector_init().
|
||||
* Added a note to the doc for ast_sip_auth_digest_algorithms_vector_init()
|
||||
noting that the vector passed in should be initialized and empty.
|
||||
* Simplified the create_artificial_auth() function in pjsip_distributor.
|
||||
* Set the vector initialization count to 0 in config_global:global_apply().
|
||||
|
Loading…
Reference in new issue