You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
kamailio/modules/domainpolicy/README

533 lines
18 KiB

Domain Policy Module
Otmar Lendl
<otmar.lendl@enum.at>
Klaus Darilion
<klaus.darilion@enum.at>
Edited by
Otmar Lendl
<otmar.lendl@enum.at>
Edited by
Klaus Darilion
<klaus.darilion@enum.at>
Copyright © 2002, 2003, 2006 Juha Heinanen, Otmar Lendl, Klaus Darilion
__________________________________________________________________
Table of Contents
1. Admin Guide
1. Overview
2. Dependencies
3. Parameters
3.1. db_url (string)
3.2. dp_table (string)
3.3. dp_col_rule (string)
3.4. dp_col_type (string)
3.5. dp_col_att (string)
3.6. dp_col_val (string)
3.7. port_override_avp (string)
3.8. transport_override_avp (string)
3.9. domain_replacement_avp (string)
3.10. domain_prefix_avp (string)
3.11. domain_suffix_avp (string)
3.12. send_socket_avp (string)
4. Functions
4.1. dp_can_connect()
4.2. dp_apply_policy()
5. RPC Commands
6. Usage Scenarios
6.1. TLS Based Federation
6.2. SIP Hub based Federation
6.3. Walled Garden Federation
7. Known Limitations
List of Examples
1.1. Setting db_url parameter
1.2. Setting dp_table parameter
1.3. Setting dp_col_rule parameter
1.4. Setting dp_col_rule parameter
1.5. Setting dp_col_att parameter
1.6. Setting dp_col_val parameter
1.7. Setting port_override_avp parameter
1.8. Setting transport_override_avp parameter
1.9. Setting domain_replacement_avp parameter
1.10. Setting domain_prefix_avp parameter
1.11. Setting domain_suffix_avp parameter
1.12. Setting send_socket_avp parameter
1.13. dp_can_connect usage
1.14. dp_apply_policy usage
Chapter 1. Admin Guide
Table of Contents
1. Overview
2. Dependencies
3. Parameters
3.1. db_url (string)
3.2. dp_table (string)
3.3. dp_col_rule (string)
3.4. dp_col_type (string)
3.5. dp_col_att (string)
3.6. dp_col_val (string)
3.7. port_override_avp (string)
3.8. transport_override_avp (string)
3.9. domain_replacement_avp (string)
3.10. domain_prefix_avp (string)
3.11. domain_suffix_avp (string)
3.12. send_socket_avp (string)
4. Functions
4.1. dp_can_connect()
4.2. dp_apply_policy()
5. RPC Commands
6. Usage Scenarios
6.1. TLS Based Federation
6.2. SIP Hub based Federation
6.3. Walled Garden Federation
7. Known Limitations
1. Overview
This modules is considered obsolete. The drafts mentioned here has
expired. If you use this module, please send a note to the sr-dev
mailing list.
The Domain Policy module implements draft-lendl-domain-policy-ddds-02
in combination with draft-lendl-speermint-federations-02 and
draft-lendl-speermint-technical-policy-00. These IETF drafts define DNS
records with which a domain can announce its federation memberships. A
local database can be used to map policy rules to routing policy
decisions. This database can also contain rules concerning destination
domains independently of draft-lendl-domain-policy-ddds-02.
This module requires a database. No caching is implemented.
2. Dependencies
The module depends on the following modules (in the other words the
listed modules must be loaded before this module):
* database -- Any database module
3. Parameters
3.1. db_url (string)
3.2. dp_table (string)
3.3. dp_col_rule (string)
3.4. dp_col_type (string)
3.5. dp_col_att (string)
3.6. dp_col_val (string)
3.7. port_override_avp (string)
3.8. transport_override_avp (string)
3.9. domain_replacement_avp (string)
3.10. domain_prefix_avp (string)
3.11. domain_suffix_avp (string)
3.12. send_socket_avp (string)
3.1. db_url (string)
This is URL of the database to be used.
Default value is “mysql://kamailio:kamailiorw@localhost/kamailio”
Example 1.1. Setting db_url parameter
modparam("domainpolicy", "db_url", "postgres://proxy:frog23@db.sip-router.org/si
pdb")
3.2. dp_table (string)
Name of table containing the local support domain policy setup.
Default value is “domainpolicy”.
Example 1.2. Setting dp_table parameter
modparam("domainpolicy", "dp_table", "supportedpolicies")
3.3. dp_col_rule (string)
Name of column containing the domain policy rule name which is equal to
the URI as published in the domain policy NAPTRs.
Default value is “rule”.
Example 1.3. Setting dp_col_rule parameter
modparam("domainpolicy", "dp_col_rule", "rules")
3.4. dp_col_type (string)
Name of column containing the domain policy rule type. In the case of
federation names, this is "fed". For standard referrals according to
draft-lendl-speermint-technical-policy-00, this is "std". For direct
domain lookups, this is "dom".
Default value is “type”.
Example 1.4. Setting dp_col_rule parameter
modparam("domainpolicy", "dp_col_type", "type")
3.5. dp_col_att (string)
Name of column containing the AVP's name. If the rule stored in this
row triggers, than dp_can_connect() will add an AVP with that name.
Default value is “att”.
Example 1.5. Setting dp_col_att parameter
modparam("domainpolicy", "dp_col_att", "attribute")
3.6. dp_col_val (string)
Name of column containing the value for AVPs created by
dp_can_connect().
Default value is “val”.
Example 1.6. Setting dp_col_val parameter
modparam("domainpolicy", "dp_col_val", "values")
3.7. port_override_avp (string)
This parameter defines the name of the AVP where dp_apply_policy() will
look for an override port number.
Default value is “portoverride”.
Example 1.7. Setting port_override_avp parameter
# string named AVP
modparam("domainpolicy", "port_override_avp", "portoverride")
3.8. transport_override_avp (string)
Name of the AVP which contains the override transport setting.
Default value is “transportoverride”.
Example 1.8. Setting transport_override_avp parameter
# string named AVP
modparam("domainpolicy", "transport_override_avp", "transportoverride")
3.9. domain_replacement_avp (string)
Name of the AVP which contains a domain replacement.
Default value is “domainreplacement”.
Example 1.9. Setting domain_replacement_avp parameter
# string named AVP
modparam("domainpolicy", "domain_replacement_avp", "domainreplacement")
3.10. domain_prefix_avp (string)
Name of the AVP which contains a domain prefix.
Default value is “domainprefix”.
Example 1.10. Setting domain_prefix_avp parameter
# string named AVP
modparam("domainpolicy", "domain_prefix_avp", "domainprefix")
3.11. domain_suffix_avp (string)
Name of the AVP which contains a domain suffix.
Default value is “domainsuffix”.
Example 1.11. Setting domain_suffix_avp parameter
# string named AVP
modparam("domainpolicy", "domain_suffix_avp", "domainsuffix")
3.12. send_socket_avp (string)
Name of the AVP which contains a send_socket. The format of the send
socket (the payload of this AVP) must be in the format
[proto:]ip_address[:port]. The function dp_apply_policy will look for
this AVP and if defined, it will force the send socket to its value
(similar to the force_send_socket core function).
Default value is “sendsocket”.
Example 1.12. Setting send_socket_avp parameter
# string named AVP
modparam("domainpolicy", "send_socket_avp", "sendsocket")
4. Functions
4.1. dp_can_connect()
4.2. dp_apply_policy()
4.1. dp_can_connect()
Checks the interconnection policy of the caller. It uses the domain in
the request URI to perform the DP-DDDS algorithm according to
draft-lendl-domain-policy-ddds-02 to retrieve the domain's policy
announcements. As of this version, only records conforming to
draft-lendl-speermint-federations-02 and
draft-lendl-speermint-technical-policy-00 are supported.
Non-terminal NAPTR records will cause recursion to the replacement
domain. dp_can_connect() will thus look for policy rules in the
referenced domain. Furthermore, an AVP for "domainreplacement"
(containing the new domain) will be added to the call. This will
redirect SRV/A record lookups to the new domain.
In order to simplify direct domain-based peerings all destination
domains are treated as if they contain a top priority "D2P+SIP:dom"
rule with the domain itself as the value of the rule. Thus any database
row with type = 'dom' and rule = 'example.com' will override any
dynamic DNS-discovered rules.
For NAPTRs with service-type "D2P+SIP:fed", the federation IDs (as
extracted from the regexp field) are used to retrieve policy records
from a local local database (basically: "SELECT dp_col_att, dp_col_val
FROM dp_table WHERE dp_col_rule = '[federationID]' AND type = 'fed').
If records are found (and all other records with the same order value
are fulfillable) then AVPs will be created from the dp_col_att and
dp_col_val columns.
For NAPTRs with service-type "D2P+SIP:std", the same procedure is
performed. This time, the database lookup searched for type = 'std',
though.
"D2P+SIP:fed" and "D2P+SIP:std" can be mixed freely. If two rules with
the same "order" match and try to set the same AVP, then the behaviour
is undefined.
The dp_col_att column specifies the AVP's name. If the AVP start with
"s:" or "i:", the corresponding AVP type (string named or integer
named) will be generated. If the excat specifier is omited, the AVP
type will be guessed.
The dp_col_val column will always be interpreted as string. Thus, the
AVP's value is always string based.
dp_can_connect returns:
* -2: on errors during the evaluation. (DNS, DB, ...)
* -1: D2P+SIP records were found, but the policy is not fullfillable.
* 1: D2P+SIP records were found and a call is possible
* 2: No D2P+SIP records were found. The destination domain does not
announce a policy for incoming SIP calls.
This function can be used from REQUEST_ROUTE.
Example 1.13. dp_can_connect usage
...
dp_can_connect();
switch(retcode) {
case -2:
xlog("L_INFO","Errors during the DP evaluation\n");
sl_send_reply("404", "We can't connect you.");
break;
case -1:
xlog("L_INFO","We can't connect to that domain\n");
sl_send_reply("404", "We can't connect you.");
break;
case 1:
xlog("L_INFO","We found matching policy records\n");
avp_print();
dp_apply_policy();
t_relay();
break;
case 2:
xlog("L_INFO","No DP records found\n");
t_relay();
break;
}
...
4.2. dp_apply_policy()
This function sets the destination URI according to the policy returned
from the dp_can_connect() function. Parameter exchange between
dp_can_connect() and dp_apply_policy() is done via AVPs. The AVPs can
be configured in the module's parameter section.
Note: The name of the AVPs must correspond with the names in the att
column in the domainpolicy table.
Setting the following AVPs in dp_can_connect() (or by any other means)
cause the following actions in dp_apply_policy():
* port_override_avp: If this AVP is set, the port in the destination
URI is set to this port. Setting an override port disables NAPTR
and SRV lookups according to RFC 3263.
* transport_override_avp: If this AVP is set, the transport parameter
in the destination URI is set to the specified transport ("udp",
"tcp", "tls"). Setting an override transport also disables NAPTR
lookups, but retains an SRV lookup according to RFC 3263.
* domain_replacement_avp: If this AVP is set, the domain in the
destination URI will be replaced by this domain.
A non-terminal NAPTR and thus a referral to a new domain implicitly
sets domain_replacement_avp to the new domain.
* domain_prefix_avp: If this AVP is set, the domain in the
destination URI will be prefixed with this "subdomain". E.g. if the
domain in the request URI is "example.com" and the
domain_prefix_avp contains "inbound", the domain in the destinaton
URI is set to "inbound.example.com".
* domain_suffix_avp: If this AVP is set, the domain in the
destination URI will have the content of the AVP appended to it.
E.g. if the domain in the request URI is "example.com" and the
domain_suffix_avp contains "myroot.com", the domain in the
destination URI is set to "example.com.myroot.com".
* send_socket_avp: If this AVP is set, the sending socket will be
forced to the socket in the AVP. The payload format of this AVP
must be [proto:]ip_address[:port].
If both prefix/suffix and domain replacements are used, then the
replacement is performed first and the prefix/suffix are applied to the
new domain.
This function can be used from REQUEST_ROUTE.
Example 1.14. dp_apply_policy usage
...
if (dp_apply_policy()) {
t_relay();
}
...
5. RPC Commands
6. Usage Scenarios
6.1. TLS Based Federation
6.2. SIP Hub based Federation
6.3. Walled Garden Federation
This section describes how this module can be use to implement
selective VoIP peerings.
6.1. TLS Based Federation
This example shows how a secure peering fabric can be configured based
on TLS and Domain Policies.
Let's assume that an organization called "TLSFED.org" acts as an
umbrella for VoIP providers who want to peer with each other but don't
want to run open SIP proxies. TLSFED.org's secretary acts as an X.509
Certification Authority that signs the TLS keys of all member's SIP
proxies. Each member should automatically allow incoming calls from
other members. On the other hand, the configuration for this federation
must not interfere with a member's participation in other VoIP peering
fabrics. All this can be achieved by the following configuration for a
participating VoIP operation called example.com:
* Incoming SIP configuration
Calls from other members are expected to use TLS and authenticate
using a client-CERT. To implement this, we cannot share a TCP/TLS
port with other incoming connections. Thus we need to use
tls_server_domain[] to dedicate a TCP port for this federation.
tls_server_domain[1.2.3.4:5066] {
tls_certificate = "/path/to/tlsfed/example-com.key"
tls_private_key = "/path/to/tlsfed/example-com.crt"
tls_ca_list = "/path/to/tlsfed/ca.pem"
tls_method = tlsv1
tls_verify_client = 1
tls_require_cleint_certificate = 1
}
* Outgoing SIP configuration
Calls to other members must also use the proper client cert.
Therefore, a TLS client domain must be configured. We use the
federation name as TLS client domain identifier. Therefore, the
content of the "tls_client_domain_avp" must be set to this
identifier (e.g. by putting it as rule into the domainpolicy
table).
tls_client_domain["tlsfed"] {
tls_certificate = "/path/to/tlsfed/example-com.key"
tls_private_key = "/path/to/tlsfed/example-com.crt"
tls_ca_list = "/path/to/tlsfed/ca.pem"
tls_method = tlsv1
tls_verify_server = 1
}
6.2. SIP Hub based Federation
This example shows how a peering fabric based on a central SIP hub can
be configured.
Let's assume that an organization called "HUBFED.org" acts as an
umbrella for VoIP providers who want to peer with each other but don't
want to run open SIP proxies. Instead, HUBFED.org operates a central
SIP proxy which will relay calls between all participating members.
Each member thus only needs to allow incoming calls from that central
hub (which could be done by firewalling). All this can be achieved by
the following configuration for a participating VoIP operation called
example.com:
* DNS configuration
The destination network announces its membership in this
federation.
$ORIGIN destination.example.org
@ IN NAPTR 10 50 "U" "D2P+SIP:fed" (
"!^.*$!http://HUBFED.org/!" . )
* Outgoing SIP configuration
Calls to other members need to be redirected to the central proxy.
The domainpolicy table just needs to list the federation and link
it to the central proxy's domain name:
mysql> select * from domainpolicy;
+----+--------------------+------+-------------------+----------------+
| id | rule | type | att | val |
+----+--------------------+------+-------------------+----------------+
| 1 | http://HUBFED.org/ | fed | domainreplacement | sip.HUBFED.org |
+----+--------------------+------+-------------------+----------------+
6.3. Walled Garden Federation
This example assumes that a set of SIP providers have established a
secure Layer 3 network between their proxies. It does not matter
whether this network is build by means of IPsec, a private Layer 2
network, or by simple firewalling. We will use the 10.x network (for
the walled garden net) and "http://l3fed.org/" (as federation
identifier) in this example.
A member of this federation (e.g. example.com) can not announce its SIP
proxy's 10.x address in the standard SRV / A records of his domain, as
this address is only meaningful for other members of this federation.
In order to facilite different IP address resolution paths within the
federation vs. outside the federation, all members of
"http://l3fed.org/" agree to prefix the destination domains with
"l3fed" before the SRV (or A) lookup.
Here is the configuration for example.com:
* DNS configuration
The destination network announces its membership in this
federation.
$ORIGIN example.com
@ IN NAPTR 10 50 "U" "D2P+SIP:fed" (
"!^.*$!http://l3fed.org/!" . )
_sip._udp IN SRV 10 10 5060 publicsip.example.com.
_sip._udp.l3fe IN SRV 10 10 5060 l3fedsip.example.com.
publicsip IN A 193.XXX.YYY.ZZZ
l3fedsip IN A 10.0.0.42
* Outgoing SIP configuration
The domainpolicy table just needs to link the federation identifier
to the agreed apon prefix:
mysql> select * from domainpolicy;
+----+-------------------+------+--------------+-------+
| id | rule | type | att | val |
+----+-------------------+------+--------------+-------+
| 1 | http://l3fed.org/ | fed | domainprefix | l3fed |
+----+-------------------+------+--------------+-------+
7. Known Limitations