[Home]

Summary:ASTERISK-04590: [patch] REMOTE_ADDR Address Exposure to Dialplan
Reporter:Joshua C. Colp (jcolp)Labels:
Date Opened:2005-07-14 11:21:40Date Closed:2011-06-07 14:02:43
Priority:MajorRegression?No
Status:Closed/CompleteComponents:Core/General
Versions:Frequency of
Occurrence
Related
Issues:
Environment:Attachments:( 0) remote_addr.diff
Description:This patch, courtesy of Asterlink/Cluecon (be sure to check us out!), exposes the IP address that the person dialed in from on the IAX2 and SIP channel drivers to the dialplan. You can use regex functions or a straight out if to act differently on it. Use it as you wish for your own needs... evil ones included!

${REMOTE_ADDR}
Comments:By: Michael Jerris (mikej) 2005-07-14 11:53:21

The word is, stuff like this should be dialplan functions, not using channel vars...

By: Kevin P. Fleming (kpfleming) 2005-07-14 20:36:48

Right, as per the dev conf call, the ideal situation is to have a dialplan function that peeks into the connected channel and returns bits and pieces of information.