Index: channels/chan_sip.c =================================================================== --- channels/chan_sip.c (revision 103711) +++ channels/chan_sip.c (working copy) @@ -704,6 +704,7 @@ static char global_sdpowner[AST_MAX_EXTENSION]; /*!< SDP owner name for the SIP channel */ static int allow_external_domains; /*!< Accept calls to external SIP domains? */ static int global_callevents; /*!< Whether we send manager events or not */ +static int global_authfailureevents; /*!< Whether we send authentication failure manager events or not. Default no. */ static int global_t1; /*!< T1 time */ static int global_t1min; /*!< T1 roundtrip time minimum */ static int global_timer_b; /*!< Timer B - RFC 3261 Section 17.1.1.2 */ @@ -9633,7 +9634,7 @@ /* Saving TCP connections is useless, we won't be able to reconnect */ if (!peer->rt_fromcontact && (peer->socket.type & SIP_TRANSPORT_UDP)) ast_db_put("SIP/Registry", peer->name, data); - manager_event(EVENT_FLAG_SYSTEM, "PeerStatus", "ChannelType: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Registered\r\n", peer->name); + manager_event(EVENT_FLAG_SYSTEM, "PeerStatus", "ChannelType: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Registered\r\nAddress: %s\r\nPort: %d\r\n", peer->name, ast_inet_ntoa(peer->addr.sin_addr), ntohs(peer->addr.sin_port)); /* Is this a new IP address for us? */ if (inaddrcmp(&peer->addr, &oldsin)) { @@ -10185,7 +10186,7 @@ case PARSE_REGISTER_UPDATE: /* Say OK and ask subsystem to retransmit msg counter */ transmit_response_with_date(p, "200 OK", req); - manager_event(EVENT_FLAG_SYSTEM, "PeerStatus", "ChannelType: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Registered\r\n", peer->name); + manager_event(EVENT_FLAG_SYSTEM, "PeerStatus", "ChannelType: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Registered\r\nAddress: %s\r\nPort: %d\r\n", peer->name, ast_inet_ntoa(sin->sin_addr), ntohs(sin->sin_port)); peer->lastmsgssent = -1; res = 0; break; @@ -10200,6 +10201,9 @@ case AUTH_SECRET_FAILED: /* Wrong password in authentication. Go away, don't try again until you fixed it */ transmit_response(p, "403 Forbidden (Bad auth)", &p->initreq); + if (global_authfailureevents) + manager_event(EVENT_FLAG_SYSTEM, "PeerStatus", "ChannelType: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Rejected\r\nCause: AUTH_SECRET_FAILED\r\nAddress: %s\r\nPort: %d\r\n", + name, ast_inet_ntoa(sin->sin_addr), ntohs(sin->sin_port)); break; case AUTH_USERNAME_MISMATCH: /* Username and digest username does not match. @@ -10207,6 +10211,9 @@ users to use the same authentication user name until we support proper authentication by digest auth name */ transmit_response(p, "403 Authentication user name does not match account name", &p->initreq); + if (global_authfailureevents) + manager_event(EVENT_FLAG_SYSTEM, "PeerStatus", "ChannelType: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Rejected\r\nCause: AUTH_USERNAME_MISMATCH\r\nAddress: %s\r\nPort: %d\r\n", + name, ast_inet_ntoa(sin->sin_addr), ntohs(sin->sin_port)); break; case AUTH_NOT_FOUND: case AUTH_PEER_NOT_DYNAMIC: @@ -10215,10 +10222,17 @@ transmit_fake_auth_response(p, &p->initreq, 1); } else { /* URI not found */ - if (res == AUTH_PEER_NOT_DYNAMIC) + if (res == AUTH_PEER_NOT_DYNAMIC) { transmit_response(p, "403 Forbidden", &p->initreq); + if (global_authfailureevents) + manager_event(EVENT_FLAG_SYSTEM, "PeerStatus", "ChannelType: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Rejected\r\nCause: AUTH_PEER_NOT_DYNAMIC\r\nAddress: %s\r\nPort: %d\r\n", + name, ast_inet_ntoa(sin->sin_addr), ntohs(sin->sin_port)); + } else transmit_response(p, "404 Not found", &p->initreq); + if (global_authfailureevents) + manager_event(EVENT_FLAG_SYSTEM, "PeerStatus", "ChannelType: SIP\r\nPeer: SIP/%s\r\nPeerStatus: Rejected\r\nCause: URI_NOT_FOUND\r\nAddress: %s\r\nPort: %d\r\n", + name, ast_inet_ntoa(sin->sin_addr), ntohs(sin->sin_port)); } break; default: @@ -12720,6 +12734,7 @@ ast_cli(a->fd, " From: Domain: %s\n", default_fromdomain); ast_cli(a->fd, " Record SIP history: %s\n", recordhistory ? "On" : "Off"); ast_cli(a->fd, " Call Events: %s\n", global_callevents ? "On" : "Off"); + ast_cli(a->fd, " Auth. Failure Events: %s\n", global_authfailureevents ? "On" : "Off"); ast_cli(a->fd, " IP ToS SIP: %s\n", ast_tos2str(global_tos_sip)); ast_cli(a->fd, " IP ToS RTP audio: %s\n", ast_tos2str(global_tos_audio)); ast_cli(a->fd, " IP ToS RTP video: %s\n", ast_tos2str(global_tos_video)); @@ -20016,6 +20031,7 @@ /* Misc settings for the channel */ global_relaxdtmf = FALSE; global_callevents = FALSE; + global_authfailureevents = FALSE; global_t1 = SIP_TIMER_T1; global_timer_b = 64 * SIP_TIMER_T1; global_t1min = DEFAULT_T1MIN; @@ -20328,6 +20344,8 @@ } } else if (!strcasecmp(v->name, "callevents")) { global_callevents = ast_true(v->value); + } else if (!strcasecmp(v->name, "authfailureevents")) { + global_authfailureevents = ast_true(v->value); } else if (!strcasecmp(v->name, "maxcallbitrate")) { default_maxcallbitrate = atoi(v->value); if (default_maxcallbitrate < 0)