Managing permissions and IP authentication

There are scenarios where you will be required to authenticate by the source IP and not by username and password. Some gateways are not capable to authenticate. In some cases, you can choose to alleviate the burden of the additional messages required for challenge authentication. An example of this case is when you are serving a call center sending more than fifty calls per second. The challenge authentication is bypassed using the check_source_address() function as seen in the previous chapter. Pay attention that UDP is not connection-oriented as TCP; thus, it is susceptible to IP spoofing. If someone sends a request with a spoofed IP authorized in the address table, a 200 OK reply will be sent and the ...

Get Building Telephony Systems with OpenSIPS - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.