File: README

package info (click to toggle)
kamailio 4.2.0-2%2Bdeb8u3
  • links: PTS, VCS
  • area: main
  • in suites: jessie
  • size: 56,276 kB
  • sloc: ansic: 552,836; xml: 166,484; sh: 8,659; makefile: 7,676; sql: 6,235; perl: 3,487; yacc: 3,428; python: 1,457; cpp: 1,219; php: 1,047; java: 449; pascal: 194; cs: 40; awk: 27
file content (285 lines) | stat: -rw-r--r-- 9,783 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285

UID Auth DB Module

Jan Janak

   FhG Fokus
   <jan@iptel.org>

Jakob Schlyter

   <jakob@schlyter.se>

   Copyright  2002, 2003 FhG FOKUS
     _________________________________________________________________

   Table of Contents

   1. Admin Guide

        1. Overview
        2. Dependencies
        3. Parameters

              3.1. db_url (string)
              3.2. user_column (string)
              3.3. domain_column (string)
              3.4. password_column (string)
              3.5. rpid_column (string)
              3.6. calculate_ha1 (integer)
              3.7. plain_password_column (string)
              3.8. password_column_2 (string)
              3.9. use_rpid (integer)

        4. Functions

              4.1. www_authorize(realm, table)
              4.2. proxy_authorize(realm, table)

   List of Examples

   1.1. db_url parameter usage
   1.2. user_column usage
   1.3. domain_column usage
   1.4. password_column usage
   1.5. rpid_column usage
   1.6. calculate_ha1usage
   1.7. plain_password_column usage
   1.8. password_column_2 usage
   1.9. use_rpidusage
   1.10. www_authorize usage
   1.11. proxy_authorize usage

Chapter 1. Admin Guide

   Table of Contents

   1. Overview
   2. Dependencies
   3. Parameters

        3.1. db_url (string)
        3.2. user_column (string)
        3.3. domain_column (string)
        3.4. password_column (string)
        3.5. rpid_column (string)
        3.6. calculate_ha1 (integer)
        3.7. plain_password_column (string)
        3.8. password_column_2 (string)
        3.9. use_rpid (integer)

   4. Functions

        4.1. www_authorize(realm, table)
        4.2. proxy_authorize(realm, table)

1. Overview

   This  module  contains  all authentication related functions that need
   the  access  to the database. This module should be used together with
   auth module, it cannot be used independently because it depends on the
   module.  Select  this  module  if  you  want  to use database to store
   authentication information like subscriber usernames and passwords. If
   you want to use radius authentication, then use auth_radius instead.

2. Dependencies

   The  module  depends  on the following modules (in the other words the
   listed modules must be loaded before this module):
     * auth.  Generic authentication functions.
     * database.  Any database module (currently mysql, postgres, dbtext)

3. Parameters

   3.1. db_url (string)
   3.2. user_column (string)
   3.3. domain_column (string)
   3.4. password_column (string)
   3.5. rpid_column (string)
   3.6. calculate_ha1 (integer)
   3.7. plain_password_column (string)
   3.8. password_column_2 (string)
   3.9. use_rpid (integer)

3.1. db_url (string)

   This is URL of the database to be used. Value of the parameter depends
   on  the  database  module  used.  For  example  for mysql and postgres
   modules this is something like
   mysql://username:password@host:port/database. For dbtext module (which
   stores  data in plaintext files) it is directory in which the database
   resides.

   Default value is "mysql://serro:47serro11@localhost/ser".

   Example 1.1. db_url parameter usage
modparam("auth_db", "db_url", "mysql://foo:bar@foobar.org/ser")

3.2. user_column (string)

   This  is  the  name  of the column holding usernames. Default value is
   fine  for  most people. Use the parameter if you really need to change
   it.

   Default value is "username".

   Example 1.2. user_column usage
modparam("auth_db", "user_column", "user")

3.3. domain_column (string)

   This is the name of the column holding domains of users. Default value
   is  fine  for  most  people.  Use  the parameter if you really need to
   change it.

   Default value is "domain".

   Example 1.3. domain_column usage
modparam("auth_db", "domain_column", "domain")

3.4. password_column (string)

   This  is  the  name  of the column holding passwords. Passwords can be
   either stored as plain text or pre-calculated HA1 strings. HA1 strings
   are  MD5 hashes of username, password, and realm. HA1 strings are more
   safe  because  the server doesn't need to know plaintext passwords and
   they cannot be obtained from HA1 strings.

   Default value is "ha1".

   Example 1.4. password_column usage
modparam("auth_db", "password_column", "password")

3.5. rpid_column (string)

   This   is   the  name  of  the  column  holding  information  for  the
   Remote-Party-ID  header  field. Default value is fine for most people.
   Use the parameter if you really need to change it.

   Default value is "rpid".

   Example 1.5. rpid_column usage
modparam("auth_db", "rpid_column", "remote_party_id")

3.6. calculate_ha1 (integer)

   This  parameter tells server whether it should read plaintext password
   from the database or HA1 string. If the parameter is set to 1 then the
   server will assume that the column pointed to by plain_password_column
   contains  plaintext passwords and it will calculate HA1 strings on the
   fly.

   If the parameter is set to 0 then the server assumes that the database
   contains  HA1  strings  directly  and will not calculate them. In this
   case  it  will use value of password_column as name of column with HA1
   password.  If  username parameter of credentials contains also @domain
   (some  user  agents  put  domain  in  username parameter), then column
   pointed  to  by password_column_2 parameter will be used instead. This
   column  should  also contain HA1 strings but they should be calculated
   including  the  domain  in  the  username  parameter  (as  opposed  to
   password_column  which  (when  containing  HA1  strings) should always
   contains HA1 strings calculated without domain in username.

   This  ensures  that  the  authentication  will  always work when using
   pre-calculated HA1 string, not depending on the presence of the domain
   in username.

   Default value of this parameter is 0.

   Example 1.6. calculate_ha1usage
modparam("auth_db", "calculate_ha1", 1)

3.7. plain_password_column (string)

   This  parameter  holds the name of column holding plain text password.
   This column is used when calculate_ha1 is set.

   Default value is "password".

   Example 1.7. plain_password_column usage
modparam("auth_db", "plain_password_column", "password")

3.8. password_column_2 (string)

   As  described  in the previous section this parameter contains name of
   column   holding   pre-calculated  HA1  string  that  were  calculated
   including the domain in the username. This parameter is used only when
   calculate_ha1 is set to 0 and user agent send a credentials containing
   the domain in the username.

   Default value of the parameter is ha1b.

   Example 1.8. password_column_2 usage
modparam("auth_db", "password_column_2", "ha1_2")

3.9. use_rpid (integer)

   This  parameter  specifies whether the server should fetch a value for
   the Remote-Party-ID header field from the database.

   If  the  parameter  is set to 1 the server expects to find a value for
   this header in the column specified by the rpid_column parameter.

   Default value of this parameter is 0.

   Example 1.9. use_rpidusage
modparam("auth_db", "use_rpid", 1)

4. Functions

   4.1. www_authorize(realm, table)
   4.2. proxy_authorize(realm, table)

4.1. www_authorize(realm, table)

   The  function  verifies  credentials  according  to  RFC2617.  If  the
   credentials  are  verified successfully then the function will succeed
   and  mark  the  credentials  as  authorized (marked credentials can be
   later  used  by  some  other functions). If the function was unable to
   verify  the  credentials  for  some  reason  then it will fail and the
   script should call www_challenge which will challenge the user again.

   Meaning of the parameters is as follows:
     * realm.   Realm  is  a  opaque  string  that  the user agent should
       present to the user so he can decide what username and password to
       use.  Usually this is domain of the host the server is running on.
       If  an  empty  string  "" is used then the server will generate it
       from  the  request.  In  case of REGISTER requests To header field
       domain  will  be used (because this header field represents a user
       being registered), for all other messages From header field domain
       will be used.
     * table.   Table  to  be  used  to  lookup  usernames  and passwords
       (usually subscribers table).

   Example 1.10. www_authorize usage
...
if (www_authorize("iptel.org", "subscriber")) {
    www_challenge("iptel.org", "1");
};
...

4.2. proxy_authorize(realm, table)

   The  function  verifies  credentials  according  to  RFC2617.  If  the
   credentials  are  verified successfully then the function will succeed
   and  mark  the  credentials  as  authorized (marked credentials can be
   later  used  by  some  other functions). If the function was unable to
   verify  the  credentials  for  some  reason  then it will fail and the
   script  should  call  proxy_challenge  which  will  challenge the user
   again.

   Meaning of the parameters is as follows:
     * realm  -  Realm  is  a  opaque  string  that the user agent should
       present to the user so he can decide what username and password to
       use. Usually this is domain of the host the server is running on.
       If  an  empty  string  "" is used then the server will generate it
       from the request. From header field domain will be used as realm.
     * table  -  Table  to  be  used  to  lookup  usernames and passwords
       (usually subscribers table).

   Example 1.11. proxy_authorize usage
...
if (!proxy_authorize("", "subscriber)) {
    proxy_challenge("", "1");  # Realm will be autogenerated
};
...