New siproxd release 0.8.0
Thomas Ries <tries@...
2010-02-28 19:22:59 GMT
This release fixes CVE-2009-3736, includes a better handling of symmetric RTP
and provides support for the UPDATE method. Everybody, please move ahead to this
CVE-2009-3736: Local privilege escalation:
Siproxd does include a so called convenience copy of libldtl. Recently a
local privilege escalation issue has been found and reported:
"ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, attempts
to open a .la file in the current working directory, which allows local users
to gain privileges via a Trojan horse file."
Find out more about CVE-2009-3736 from MITRE CVE:
Two measures have been implemented with siproxd:
- Siproxd does use a system provided libltdl, if available. The included
convenienve copy will only be used as a fallback if no libltdl is provided
on the building host.
- The included convenience copy in the siproxd package has been updated to
a version that has this issue fixed.
Release Notes for siproxd-0.8.0
Major changes since 0.7.2:
- CVE-2009-3736: use libltdl on host if existing and fall
back using convenienve libltdl (with a config warning)
- updated libtool version
- Support for UPDATE (RFC3311)
- Basic TCP support for SIP signalling
- Better handling of symmetric RTP
- STUN plugin to determine the public (outbound) IP address
Upgrade Notes 0.7.2 to 0.8.0:
- Merge the configuration file
- SIP (RFC3261) Proxy for SIP based softphones hidden behind a
- Support for PRACK messages (RFC3262)
- Support for UPDATE messages (RFC3311)
- SIP UDP and TCP supported
- Works with "dial-up" conenctions (dynamic IP addresses)
- Multiple local users/hosts can be masqueraded simultaneously
- Access control (IP based) for incoming traffic
- Proxy Authentication for registration of local clients (User Agents)
with individual passwords for each user
- May be used as pure Outbound proxy (registration of local UAs
to a 3rd party registrar)
- Fli4l OPT_SIP (still experimental) available, check
- runs on various operating systems (see below)
- Full duplex RTP data stream proxy for *incoming* and *outgoing*
audio data - no firewall masquerading entries needed
- Port range to be used for RTP traffic is configurable
(-> easy to set up apropriate firewall rules for RTP traffic)
- RTP proxy can handle multiple RTP streams (eg. audio + video)
within a single SIP session.
- Symmetric RTP support
- Symmetric SIP signalling support
- Supports running in a chroot jail and changing user-ID after startup
- All configuration done via one simple ascii configuration file
- Logging to syslog in daemon mode
- RPM package (Spec file)
- The host part of UA registration entries can be masqueraded
(mask_host, masked_host config items). Some Siemens SIP phones seem to
need this 'feature'.
- Provider specific outbound proxies can be configured
- Can run "in front of" a NAT router.(in the local LAN segment)
- supports "Short-Dials"
- configurable RFC3581 (rport) support for sent SIP packets
- pthreads (Linux)
- glibc2 / libc5 / uClibc
- libosip2 (3.x.x)
Mainly tested on:
- CentOS 5, 32bit Linux
This is my main development and testing environment. Other platforms
are not extensively tested.
Builds on (tested by dev-team or reported to build):
- Linux: Fedora
( Fedora 64bit )*
( WRT54g (133mhz mipsel router))*
(- FreeBSD: FreeBSD 4.10-BETA )*
(- OpenBSD: OpenBSD 3.4 GENERIC#18 )*
(- SunOS: SunOS 5.9 )*
(- Mac OS X: Darwin 6.8 )*
* Note: As the compile farm of sourceforge.net has been discontinued our
building test possibilities are now very limited. Currently
no explicit testing for systems/distributions other than
Fedora/CentOS (x86 architecture) is made. We'll be looking into
possibilities to perform some broader testing in future.
Of course, external help will be welcome
Reported interoperability with softphones:
- Grandstream BudgeTone-100 series
- Linphone (local and remote UA) (http://www.linphone.org)
- Kphone (local and remote UA) (http://www.wirlab.net/kphone/)
- MSN messenger 4.6 (remote and local UA)
- X-Lite (Win XP Professional)
- SJPhone softphone
- Asterisk PBX (using a SIP Trunk, masqueraded via siproxd)
Reported interoperability with SIP service providers:
- Sipphone (http://www.sipphone.com)
- Sipgate (http://www.sipgate.de)
- Stanaphone (SIP Gateway to PSTN)
- Sipcall.ch (Swiss VoIP provider)
- Gizmo (actually sipphone.com)
If you have siproxd successfully running with another SIP phone
and/or service provider, please drop me a short note so I can update
Known interoperability issues with SIP service providers:
- callcentric.com (afaik callcentric fails with "500 network failure"
during REGISTER if more than one Via header is
present in a SIP packet. Having multiple Via headers
is completely in compliance with RFC3261. This might
be related to their "NAT problem avoidance magic".
There is nothing that can be done within siproxd
to avoid this issue as callcentric does not comply
with the SIP specification.
- asterisk PBX Asterisk has an issue finding the proper peer
if multiple peers originate from the same IP/port
tuple (a is the case if multiple phones are proxied
via siproxd to the same asterisk instance).
This is caused by the SIP implementation in
Note: This seems to be no longer valid with
asterisk version 1.6 and up.
- SRV DNS records are not yet looked up, only A records
There will be more for sure...
If you port siproxd to a new platform or do other kinds of changes
or bugfixes that might be of general interest, please drop me a
line. Also if you intend to include siproxd into a software
distribution I'd be happy to get a short notice.
Signatures for siproxd-0.8.0.tar.gz archive:
MD5 Hash: a39bc2a06a1c9abb6118ca3482e98f3c
SHA-256 Hash: 1a0306dbf5dd65f2c6d779bd449cbabba8c1a4cc79ca034e9cc83836c60f8542
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
-----END PGP SIGNATURE-----
GnuPG: pub 1024D/87BCDC94 2000-03-19 Thomas Ries (tries at gmx.net)
- Fingerprint = 13D1 19F5 77D0 4CEC 8D3F A24E 09FC C18A 87BC DC94
- Key via pgp.openpkg.org / http://www.ries.ch.vu/87BCDC94.pub
VoIP: sip:17476691342@... | sip:431783@...
Download Intel® Parallel Studio Eval
Try the new software tools for yourself. Speed compiling, find bugs
proactively, and fine-tune applications for parallel performance.
See why Intel Parallel Studio got high marks during beta.
Siproxd-users mailing list